0% found this document useful (0 votes)
4 views

Computer_Science__Notes_O_Level-31

The document outlines the ZIMSEC syllabus for 'O' Level Computer Studies, focusing on computer applications, Computer Aided Design (CAD), and Virtual Reality (VR). It details the uses, advantages, and disadvantages of CAD in various fields, as well as the requirements and applications of VR technology. Additionally, it discusses the processes involved in creating virtual reality images and the features of virtual tours on the internet.

Uploaded by

newman mapfumo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer_Science__Notes_O_Level-31

The document outlines the ZIMSEC syllabus for 'O' Level Computer Studies, focusing on computer applications, Computer Aided Design (CAD), and Virtual Reality (VR). It details the uses, advantages, and disadvantages of CAD in various fields, as well as the requirements and applications of VR technology. Additionally, it discusses the processes involved in creating virtual reality images and the features of virtual tours on the internet.

Uploaded by

newman mapfumo
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 163

‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭COMPUTER APPLICATION‬
‭ his‬ ‭chapter‬ ‭deals‬ ‭with‬ ‭the‬ ‭areas‬ ‭where‬ ‭computers‬ ‭are‬ ‭used,‬ ‭what‬ ‭they‬ ‭used‬ ‭for,‬
T
‭how they are used, the advantages and disadvantages of their usage in such areas.‬

‭COMPUTER AIDED DESIGN (CAD).‬


‭ his‬ ‭is‬ ‭whereby‬ ‭computers‬ ‭are‬ ‭used‬ ‭in‬ ‭the‬ ‭designing‬ ‭and‬ ‭development‬ ‭o f‬ ‭new‬
T
‭products‬ ‭in‬ ‭a‬ ‭variety‬ ‭o f‬ ‭applications‬ ‭both‬ ‭at‬ ‭home‬ ‭and‬ ‭o n‬ ‭a‬ ‭commercial/industrial‬
‭basis.‬‭Models‬‭o f‬‭infrastructure‬‭like‬‭bridges‬‭are‬‭designed‬‭and‬‭tested‬‭for‬‭their‬‭strength‬
‭before‬ ‭building‬ ‭actual‬ ‭structures‬ ‭o n‬ ‭the‬ ‭ground.‬ ‭A‬ ‭model‬ ‭is‬ ‭a‬ ‭computer‬
‭representation‬‭o f‬‭a‬‭real‬‭o bject/process,‬‭o ften‬‭involving‬‭some‬‭formula‬‭that‬‭determines‬
‭its behaviour, e.g. a bridge, house, etc. CAD is used in fields like:‬
‭- Aerospace‬
‭- Architecture‬
‭- Car/vehicle design‬
‭- Construction (e.g. Roads, services, surveying, tunnels, bridges, etc.)‬
‭- Consumer goods (e.g. kettles, toasters, etc.)‬
‭- Digital circuits‬
‭- Factory layouts (e.g. Ergonomics)‬
‭- Fashion design‬
‭- Heating systems‬
‭- Interior designs (houses, offices, etc.)‬
‭- Lighting systems (e.g. to get lighting effects at a concert)‬
‭- Machinery design‬
‭- Plant design (chemical, nuclear, etc.)‬
‭- Ship building engineering, architectural design, etc.‬

‭ AD Requirements‬
C
‭-‬ ‭considerable processor power‬
‭-‬ ‭Input devices like:‬
‭-‬ ‭Light‬‭pen:‬‭Used‬‭to‬‭make‬‭alterations‬‭o n‬‭the‬‭screen‬‭to‬‭the‬‭drawings.‬‭Also‬‭used‬
‭to write directly on the screen. Can be used again to select commands.‬
‭-‬ ‭Tracker balls: used to draw designs and to select menus‬
‭-‬ ‭Mouse: adjust drawings‬
‭-‬ ‭Graphics‬‭tablet:‬‭provide‬‭interface‬‭for‬‭drawing‬‭o n‬‭the‬‭screen.‬‭It‬‭also‬‭links‬‭with‬
‭the light pen.‬
‭-‬ ‭Output Devices like:‬
‭- Large high resolution screens‬
‭- Graph plotters to draw scale and full size and high quality drawings‬
‭- High specification graphics cards‬
‭-‬ ‭Some‬ ‭systems‬ ‭support‬ ‭stereoscopic‬ ‭drawings‬ ‭where‬ ‭3-D‬ ‭spectacles‬ ‭can‬ ‭be‬ ‭worn‬
‭and the user sees a 3-D image.‬

‭Features of the CAD software which are used in design‬‭are:‬


-‭ Can zoom, rotate, scale, and crop images‬
‭- Has a library of geometrical shapes that will be used in drawings‬
‭- Has inbuilt library of components and templates.‬
‭- Have ability for labelling and adding text‬
‭- use 2-D and 3-D modelling‬
‭- has library of parts which can be used in new drawings‬
‭- use colour fill feature‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭1‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ Validation and verification of designs against original specification‬
‭- Ability to link with‬‭Computer-Aided Manufacture‬‭(CAM)‬
‭- Facility to calculate the mass of the actual object once built‬
‭- Facility to calculate the cost of producing the article‬
‭- Simulation of designs without the need to build a prototype‬
‭- Import and export to allow the exchange of data with other software packages‬
‭- Kinematics (i.e. check moving parts in assemblies don’t interfere with each other)‬

‭ dvantages of Computer Aided Design‬


A
‭-‬ ‭Saves a lot of time spent in drawing and testing objects.‬
‭-‬ ‭Saves costs of designing items‬
‭-‬ ‭Produces accurate scale diagrams.‬
‭-‬ ‭Images are easily manipulated on the screen.‬
‭-‬ ‭One can produce drawings in 3-dimensions as in buildings, gardens, bridges, etc.‬
‭-‬ ‭Images can be saved on the disk and retrieved at a later date.‬
‭-‬ ‭Drawings can be easily scaled up and down.‬
‭-‬ ‭It is easier to modify drawings‬
‭-‬ ‭A library of parts can be kept for future use‬
‭-‬ ‭Ability to do automatic costing of items‬
‭-‬ ‭Ability to model the design‬
‭-‬ ‭Can do ergonomic study.‬

‭ B‬‭:‬ ‭Ergonomics‬‭:‬ ‭the‬ ‭design‬ ‭and‬ ‭functionality‬ ‭o f‬ ‭the‬ ‭computer‬ ‭environment‬ ‭and‬
N
‭includes‬ ‭furniture‬ ‭setup‬ ‭and‬ ‭how‬ ‭it‬ ‭affect‬ ‭human‬ ‭beings,‬ ‭e.g.‬ ‭ventilation,‬ ‭security,‬
‭space, noise, etc.‬

‭Disadvantages of Computer Aided Design‬


‭-‬ ‭Can‬‭lead‬‭to‬‭deskilling‬‭(skills‬‭which‬‭were‬‭highly‬‭valued‬‭are‬‭taken‬‭to‬‭be‬‭useless‬‭o r‬
‭o f‬ ‭less‬ ‭value‬ ‭by‬ ‭the‬ ‭introduction‬ ‭o f‬ ‭computers‬ ‭and‬ ‭workers‬ ‭degraded‬ ‭to‬ ‭less‬
‭important jobs)‬
‭-‬ ‭Involves very high training costs to use the packages‬
‭-‬ ‭Can move work overseas‬
‭-‬ ‭Can‬ ‭lead‬ ‭to‬ ‭unemployment‬ ‭as‬ ‭o ne‬ ‭CAD‬ ‭o perator‬ ‭can‬ ‭do‬ ‭work‬ ‭o f‬ ‭5‬ ‭manual‬
‭draftsmen.‬

‭VIRTUAL REALITY (VR)‬


I‭ t‬‭is‬‭an‬‭artificial‬‭3-D‬‭environment‬‭created‬‭by‬‭a‬‭computer‬‭system.‬‭It‬‭is‬‭the‬‭creation‬‭o f‬
‭simulated‬‭multi-dimensional‬‭representation‬‭o f‬‭real‬‭things,‬‭e.g.‬‭armies‬‭fighting‬‭against‬
‭each‬ ‭o ther.‬ ‭Users‬ ‭wear‬ ‭data‬ ‭goggles,‬ ‭data‬ ‭gloves,‬ ‭etc‬ ‭when‬ ‭interacting‬ ‭with‬ ‭the‬
‭system.‬

‭ equirements for Virtual Reality (VR)‬


R
‭-‬ ‭Data‬‭goggles/helmets‬‭–‬‭these‬‭use‬‭display‬‭screens‬‭and‬‭o ptical‬‭systems‬‭that‬‭send‬
‭3-D images to the eyes.‬
‭-‬ ‭Motion‬ ‭sensors‬‭:‬ ‭measure‬ ‭the‬ ‭position‬ ‭and‬ ‭o rientation‬ ‭o f‬ ‭the‬ ‭head;‬ ‭this‬
‭information‬‭is‬‭sent‬‭back‬‭to‬‭a‬‭computer‬‭which‬‭enables‬‭it‬‭to‬‭adjust‬‭the‬‭image‬‭being‬
‭sent to the user.‬
‭-‬ ‭Data‬ ‭gloves‬‭,‬ ‭suits‬ ‭containing‬ ‭sensors‬ ‭and‬ ‭joysticks‬ ‭are‬ ‭all‬ ‭used‬ ‭to‬ ‭interface‬
‭with a virtual reality system depending on the application.‬
‭NB‬‭.‬ ‭User‬ ‭wears‬ ‭data‬ ‭goggles,‬ ‭data‬ ‭helmet‬ ‭o r‬ ‭data‬ ‭gloves‬ ‭to‬‭give‬‭a‬‭feeling‬‭o f‬‭“being‬
‭there”.‬‭Apart‬‭from‬‭feeding‬‭sensory‬‭input‬‭to‬‭the‬‭user,‬‭these‬‭devices‬‭also‬‭monitor‬‭user‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭2‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
a‭ ctions‬ ‭e.g.‬ ‭data‬ ‭goggles‬ ‭track‬ ‭eye‬ ‭movement‬ ‭and‬ ‭respond‬ ‭by‬ ‭sending‬ ‭new‬ ‭video‬
‭input.‬
‭Areas of use for Virtual Reality (VR)‬
‭1.‬ ‭Entertainment‬‭:‬
‭a)‬ ‭Used‬‭in‬‭films/television‬‭as‬‭special‬‭effects‬‭where‬‭the‬‭studio‬‭audience‬‭wear‬
‭VR helmets in a space simulation.‬
‭b)‬ ‭Also used in computer arcade games like Need for Speed.‬
‭2.‬ ‭Marketing‬
‭a)‬ ‭Used‬ ‭in‬ ‭virtual‬ ‭tours‬ ‭around‬ ‭houses‬ ‭and‬ ‭hotels,‬ ‭kitchen‬ ‭designs,‬
‭ergonomics, etc.‬
‭3.‬ ‭Training‬‭:‬ ‭Areas‬ ‭o f‬ ‭use‬ ‭include:‬ ‭military‬ ‭training,‬ ‭medical/dental‬ ‭training,‬
‭teaching‬‭personnel‬‭how‬‭to‬‭use‬‭equipment‬‭and‬‭in‬‭general‬‭areas‬‭where‬‭training‬‭is‬
‭dangerous‬ ‭and/or‬ ‭expensive‬ ‭e.g.‬ ‭flight‬ ‭simulators,‬ ‭car‬ ‭driving‬ ‭simulators,‬
‭o perating devices under water or in outer space, etc.‬
‭4.‬ ‭Design‬‭:‬ ‭Design‬ ‭o f‬ ‭chemical‬ ‭and‬ ‭nuclear‬ ‭plants,‬ ‭ergonomic‬ ‭studies‬ ‭(e.g.‬ ‭factory‬
‭layouts), helping to develop devices for handicapped people, etc.‬

‭ ow to create virtual reality images for use on a computer system‬


H
‭When‬ ‭a‬ ‭virtual‬ ‭tour‬ ‭o f‬ ‭a‬ ‭house‬ ‭is‬ ‭shown‬ ‭o n‬ ‭a‬ ‭website,‬ ‭the‬ ‭images‬‭need‬‭to‬‭be‬‭first‬
‭created‬ ‭and‬ ‭then‬ ‭manipulated.‬ ‭The‬ ‭following‬ ‭summarises‬ ‭how‬ ‭this‬ ‭can‬ ‭be‬ ‭done‬ ‭(a‬
‭similar method/technique could be used for various applications):‬
‭-‬ ‭take photos with, for example, a digital camera‬
‭-‬ ‭the photos are taken from a single point (reference point)‬
‭-‬ ‭the camera is rotated around the room as a number of photos are taken‬
‭-‬ ‭the images are “stitched” together using special imaging software‬
‭-‬ ‭photo images are re-sized and re-configured for Internet use‬
‭-‬ ‭Use‬‭hotspots‬‭o n‬‭the‬‭web‬‭page‬‭to‬‭allow‬‭a‬‭user‬‭to‬‭move‬‭around‬‭the‬‭house‬‭(e.g.‬
‭from room to room).‬
‭-‬ ‭Integrate plans and maps into the image to allow user to navigate the house.‬

‭ B‬‭:‬ ‭A‬ ‭hotspot‬ ‭is‬ ‭an‬ ‭area‬ ‭o f‬ ‭a‬ ‭graphics‬ ‭o bject,‬ ‭o r‬ ‭a‬ ‭section‬ ‭o f‬ ‭text,‬ ‭that‬ ‭activates‬‭a‬
N
‭function‬ ‭when‬ ‭selected.‬ ‭Hot‬ ‭spots‬ ‭are‬ ‭particularly‬ ‭common‬ ‭in‬ ‭multimedia‬
‭applications,‬ ‭where‬ ‭selecting‬ ‭a‬ ‭hot‬ ‭spot‬ ‭can‬ ‭make‬ ‭the‬ ‭application‬ ‭display‬‭a‬‭picture,‬
‭run a video, or open a new window, etc.‬

‭ eatures‬ ‭to‬ ‭see‬ ‭on‬ ‭a‬ ‭virtual‬ ‭tour‬ ‭website‬ ‭of‬ ‭a‬ ‭hotel‬ ‭being‬ ‭advertised‬ ‭on‬ ‭the‬
F
‭internet‬
‭-‬ ‭hot spots on web page to allow user to move around the hotel‬
‭-‬ ‭plans and maps integrated to allow user to navigate the hotel‬
‭-‬ ‭ability to move from room to room to navigate whole hotel‬

‭ evelopments‬ ‭such‬ ‭as‬ ‭broadband‬‭,‬ ‭large‬ ‭computer‬ ‭memories‬ ‭and‬ ‭compression‬


D
‭software‬ ‭have‬ ‭allowed‬ ‭virtual‬ ‭tours‬ ‭to‬ ‭be‬ ‭o ffered‬ ‭o n‬ ‭the‬ ‭Internet‬ ‭and/or‬ ‭CD/DVD‬
‭files.‬

‭Advantages of using virtual reality‬


‭-‬ ‭it‬ ‭is‬ ‭safer‬ ‭to‬ ‭use‬ ‭than‬ ‭testing‬ ‭real‬ ‭o bjects‬ ‭(if‬ ‭mistakes‬ ‭are‬ ‭made‬ ‭the‬ ‭results‬
‭would‬ ‭be‬ ‭harmless;‬ ‭e.g.‬ ‭doing‬ ‭a‬ ‭medical‬ ‭task‬ ‭o n‬ ‭a‬ ‭“virtual”‬ ‭patient‬ ‭is‬ ‭much‬
‭safer in case of mistakes)‬
‭-‬ ‭Saves‬ ‭costs‬ ‭since‬ ‭there‬ ‭is‬‭no‬‭need‬‭o f‬‭building‬‭the‬‭real‬‭thing‬‭e.g.‬‭testing‬‭o ut‬‭a‬
‭real‬ ‭moon‬ ‭rocket‬ ‭o r‬ ‭building‬ ‭a‬ ‭part‬ ‭o f‬ ‭a‬ ‭chemical‬ ‭plant‬ ‭would‬ ‭be‬ ‭very‬
‭expensive).‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭3‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ I‭ t‬ ‭is‬ ‭possible‬ ‭to‬ ‭do‬ ‭tasks‬ ‭which‬ ‭would‬ ‭normally‬ ‭be‬ ‭impossible‬ ‭(e.g.‬ ‭walking‬
‭inside a nuclear reactor, doing a task in outer space, etc.)‬
‭-‬ ‭There is a feeling of “being there” which makes the training more realistic‬
‭-‬ ‭Allow‬ ‭a‬ ‭number‬ ‭o f‬ ‭very‬ ‭realistic‬ ‭scenarios‬ ‭to‬ ‭be‬ ‭tested‬ ‭o ut‬ ‭e.g.‬ ‭how‬ ‭to‬‭deal‬
‭with‬ ‭an‬ ‭emergency‬ ‭o n‬ ‭a‬ ‭chemical‬ ‭plant‬ ‭which‬ ‭could‬ ‭be‬ ‭made‬ ‭to‬ ‭be‬ ‭really‬
‭realistic.‬

‭ROBOTICS‬
‭-‬ A ‭ ‬ ‭robot‬ ‭is‬ ‭a‬ ‭reprogrammable,‬ ‭multifunctional‬ ‭computer‬ ‭controlled‬ ‭device‬
‭designed‬‭to‬‭perform‬‭multiple‬‭tasks‬‭in‬‭industries,‬‭replacing‬‭human‬‭beings;‬‭e.g.‬‭for‬
‭spray painting, welding, fixing parts of a car, etc.‬
‭-‬ ‭Robotics‬ ‭refers‬ ‭to‬ ‭the‬ ‭science‬‭o f‬‭developing‬‭and‬‭the‬‭use‬‭o f‬‭computer‬‭controlled‬
‭devices to replace human beings in manufacturing.‬
‭-‬ ‭Robots can contain embedded processors or be linked to a computer system.‬
‭-‬ ‭They‬ ‭are‬ ‭pre-programmed‬ ‭to‬ ‭do‬ ‭a‬ ‭specific‬ ‭task‬ ‭o r‬ ‭“taught”‬ ‭to‬ ‭remember‬
‭instructions‬‭from‬‭a‬‭human‬‭o perator‬‭carrying‬‭o ut‬‭the‬‭task‬‭manually‬‭e.g.‬‭teaching‬‭a‬
‭robot to spray a car with paint.‬
‭-‬ ‭Robots‬ ‭rely‬ ‭o n‬ ‭processors‬ ‭and‬ ‭sensors.‬ ‭The‬ ‭sensors‬ ‭gather‬ ‭information‬ ‭so‬ ‭that‬
‭the‬ ‭robot‬ ‭knows‬ ‭it‬ ‭is‬ ‭the‬ ‭right‬ ‭time‬ ‭to‬ ‭do‬ ‭the‬ ‭task‬ ‭(e.g.‬‭is‬‭a‬‭car‬‭in‬‭position‬‭to‬‭be‬
‭sprayed, is there an obstruction to prevent the robot doing its task, etc.)‬
‭-‬ ‭They‬ ‭are‬ ‭capable‬ ‭o f‬ ‭doing‬‭some‬‭pseudo-intelligent‬‭tasks‬‭(e.g.‬‭different‬‭sized‬‭cars‬
‭to be painted)‬
‭-‬ ‭Robots are mostly used (suitable) in the following areas:‬
‭o ‬ ‭In‬ ‭very‬ ‭dangerous‬ ‭areas‬ ‭for‬ ‭human‬ ‭beings‬ ‭to‬ ‭work‬‭,‬ ‭e.g.‬ ‭fire‬ ‭fighting,‬
‭nuclear‬‭power‬‭stations,‬‭underground‬‭mining,‬‭chemical,‬‭nuclear‬‭factories,‬‭deep‬
‭in the ocean, in space, etc.‬
‭o ‬ ‭In‬ ‭areas‬ ‭where‬ ‭heavy‬ ‭items‬ ‭are‬ ‭to‬ ‭be‬ ‭lifted‬‭,‬ ‭e.g.‬ ‭for‬ ‭loading‬ ‭containers‬ ‭in‬
‭ships, in production lines, etc.‬
‭o‬ ‭In‬ ‭areas‬ ‭where‬ ‭the‬ ‭degree‬ ‭of‬ ‭accuracy‬ ‭is‬ ‭of‬ ‭utmost‬ ‭importance‬‭,‬ ‭e.g.‬
‭manufacturing of computer chips. Thus producing standardised goods.‬
‭o‬ ‭Where‬ ‭work‬ ‭is‬ ‭repeatedly‬ ‭executed‬ ‭and‬‭boring‬‭,‬‭like‬‭traffic‬‭control‬‭at‬‭road‬
‭junctions‬

‭ eatures (Parts) of a Robot‬


F
‭Robots have the following features (parts/characteristics):‬
‭-‬ ‭Actuator‬ ‭(Manipulator)‬‭:‬ ‭-‬ ‭A‬ ‭moving‬ ‭part‬ ‭which‬ ‭resembles‬ ‭a‬ ‭moving‬ ‭arm‬ ‭used‬
‭for lifting and fitting items.‬
‭-‬ ‭Transducer‬‭: They convert analogue signals to voltage‬‭signals.‬
‭-‬ ‭Sensors‬‭: capture information and data from the environment‬‭in analogue form‬
‭-‬ ‭Analogue‬‭-‬‭Digital Converter‬‭(ADC):Convert analogues‬‭signals to digital signals‬
‭-‬ ‭Microprocessor‬‭: Processes data collected from sensors‬
‭-‬ ‭Power supply‬‭: - Usually electricity through compressors‬‭o r stepper motors.‬
‭-‬ ‭Controlling‬ ‭Computers‬‭:‬ ‭-‬ ‭Connected‬ ‭through‬‭an‬‭interface‬‭to‬‭give‬‭instructions‬‭to‬
‭the robot.‬
‭-‬ ‭Have‬ ‭some‬ ‭form‬ ‭o f‬ ‭interface‬ ‭(‬‭connection‬ ‭points‬ ‭to‬ ‭power‬ ‭supply,‬ ‭human‬
‭interface, etc.‬‭)‬

‭ obots‬ ‭can‬ ‭move‬ ‭from‬ ‭o ne‬ ‭position‬ ‭to‬ ‭another,‬ ‭e.g.‬ ‭when‬ ‭lifting‬ ‭cars‬ ‭into‬ ‭the‬
R
‭warehouse and when going for recharging their batteries.‬
‭They‬ ‭keep‬ ‭a‬ ‭record‬ ‭o f‬ ‭the‬ ‭distance‬ ‭they‬ ‭have‬ ‭travelled‬ ‭and‬ ‭the‬ ‭angles‬ ‭they‬ ‭have‬
‭turned through so that they can return to original position‬
‭They can sense (using light sensor) and stop if unwanted object gets on their way.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭4‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ hey‬‭need‬‭information‬‭and‬‭programming‬‭for‬‭them‬‭to‬‭work.‬‭Information‬‭is‬‭provided‬
T
‭by sensors.‬

‭ obots can be used for spray painting:‬


R
‭Problems that Robots may encounter when spray painting and the Solutions‬
‭-‬ ‭Problem‬‭: Robot may run out of paint‬
‭Solution‬‭: include sensors in paint reservoir to indicate‬‭low paint levels‬
‭-‬ ‭Problem:‬‭something gets in path of robot‬
‭Solution:‬‭include sensors to detect presence of an‬‭o bject blocking the robot‬
‭-‬ ‭Problem:‬‭Item may not be in the correct position‬
‭Solution‬‭: include sensors to ensure item is in the‬‭correct position‬
‭-‬ ‭Problem:‬‭Item is not present‬
‭Solution‬‭: Include sensors to detect if the item is‬‭present‬

‭ dvantages of Using Robots‬


A
‭-‬ ‭Reduces labour costs as less people will be employed.‬
‭-‬ ‭High quality work is produced, which is also of high standard and consistent.‬
‭-‬ ‭Reduces cost (price) of goods due to reduced labour costs.‬
‭-‬ ‭Increases‬‭production‬‭volumes‬‭o f‬‭goods‬‭since‬‭more‬‭goods‬‭are‬‭produced‬‭in‬‭a‬‭very‬
‭short period of time.‬
‭-‬ ‭Ensures high degree of accuracy when producing goods.‬
‭-‬ ‭Robots can operate in the dark thereby saving electricity costs.‬
‭-‬ ‭Robots do not take breaks and holidays as they do not get tired.‬
‭-‬ ‭Robots can work 24 hours a day; they can work non-stop; they don’t need a break‬
‭-‬ ‭Robots reduce accidents at traffic lights.‬
‭-‬ ‭Robots improve traffic flow.‬
‭-‬ ‭Robots can work in dangerous conditions.‬
‭-‬ ‭Create employment as the robots need to be serviced and installed.‬
‭-‬ ‭Eliminates human errors involved in the production process.‬
‭-‬ ‭Removes‬ ‭the‬ ‭need‬ ‭to‬ ‭do‬ ‭boring,‬ ‭very‬ ‭repetitive‬ ‭tasks‬ ‭leaving‬ ‭humans‬‭free‬‭to‬‭do‬
‭the more skilled work such as quality control.‬

‭ B‬‭:‬‭However errors still exists due to:‬


N
‭-‬ ‭Loss of power to the robot.‬
‭-‬ ‭Fault in the software (wrongly programmed).‬
‭-‬ ‭Occurrences of hardware break down.‬
‭-‬ ‭Some robot components can be missing or misplaced.‬

‭ isadvantages of Using Robots‬


D
‭-‬ ‭Leads to unemployment as humans are replaced by robots‬
‭-‬ ‭Electricity expenses are very high.‬
‭-‬ ‭they‬‭can‬‭find‬‭it‬‭difficult‬‭to‬‭deal‬‭with‬‭“unusual”‬‭circumstances‬‭e.g.‬‭a‬‭door‬‭is‬‭missing‬
‭from a car waiting on the paint spraying line‬
‭-‬ ‭leads to de-skilling since many tasks are taken over by robots‬

‭ARTIFICIAL INTELLIGENCE‬
‭ rtificial‬‭Intelligence‬‭(AI)‬‭is‬‭the‬‭science‬‭o f‬‭developing‬‭computer‬‭systems‬‭that‬‭have‬
A
‭the‬‭ability‬‭to‬‭learn‬‭from‬‭experience‬‭and‬‭mimic‬‭human‬‭reasoning‬‭in‬‭specific‬‭areas,‬‭as‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭5‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
i‭n‬ ‭medical‬ ‭diagnosis,‬ ‭mineral‬ ‭prospecting,‬ ‭etc.‬ ‭Expert‬ ‭systems‬ ‭are‬ ‭a‬ ‭branch‬ ‭o f‬
‭Artificial Intelligence‬

‭ XPERT SYSTEMS‬
E
‭These‬ ‭are‬ ‭computer‬‭systems‬‭developed‬‭to‬‭mimic‬‭human‬‭reasoning‬‭and‬‭work‬‭at‬‭the‬
‭level‬‭o f‬‭an‬‭expert‬‭in‬‭a‬‭particular‬‭field,‬‭e.g.‬‭in‬‭medical‬‭diagnosis.‬‭A‬‭good‬‭example‬‭o f‬‭an‬
‭expert‬ ‭system‬ ‭is‬ ‭MYCIN‬‭that‬‭diagnose‬‭bacterial‬‭blood‬‭disease‬‭and‬‭then‬‭recommend‬
‭appropriate antibiotic therapy for patients.‬
‭Expert systems are used in the following fields:‬
‭-‬ ‭o il or minerals prospecting,‬
‭-‬ ‭diagnosing a person’s illness,‬
‭-‬ ‭Diagnostics (e.g. finding faults in a car engine, etc.),‬
‭-‬ ‭tax and financial calculations,‬
‭-‬ ‭complex “thinking” tasks such as‬‭chess,‬
‭-‬ ‭weather forecasting,‬
‭-‬ ‭criminology/forensic science,‬
‭-‬ ‭career choices,‬‭etc‬

‭ omponents (Elements) of an Expert System‬


C
‭-‬ ‭The diagram below shows some of the components:‬

‭-‬ ‭ nowledge‬ ‭Base‬‭:‬ ‭a‬ ‭representation‬ ‭o f‬ ‭facts‬ ‭(data)‬ ‭in‬ ‭a‬ ‭particular‬ ‭field‬ ‭(e.g.‬
K
‭diseases, symptoms, treatments, etc. as in medical diagnosis)‬
‭-‬ ‭Inference‬‭procedure‬‭(engine)‬‭:‬‭contains‬‭reasoning‬‭methods‬‭used‬‭to‬‭arrive‬‭at‬‭a‬
‭conclusion‬ ‭using‬ ‭information‬ ‭in‬ ‭the‬ ‭knowledge‬ ‭base.‬ ‭It‬ ‭contains‬ ‭interrogation‬
‭technique/questions and answers.‬
‭-‬ ‭User‬ ‭interfaces‬‭:‬ ‭these‬ ‭enable‬‭people‬‭to‬‭form‬‭queries,‬‭provide‬‭information,‬‭and‬
‭interact with the system.‬
‭-‬ ‭Explanation‬ ‭facilities‬ ‭(system)‬‭:‬ ‭enable‬ ‭the‬ ‭systems‬ ‭to‬ ‭explain‬ ‭o r‬ ‭justify‬ ‭their‬
‭conclusions,‬ ‭and‬ ‭they‬ ‭also‬ ‭enable‬ ‭developers‬ ‭to‬ ‭check‬ ‭o n‬ ‭the‬ ‭o peration‬ ‭o f‬ ‭the‬
‭system themselves.‬
‭-‬ ‭Rule‬ ‭Base‬‭:‬ ‭This‬ ‭is‬ ‭found‬ ‭in‬ ‭the‬ ‭Working‬ ‭Store‬‭.‬ ‭It‬ ‭contains‬ ‭inference‬‭rules‬‭and‬
‭the inference engine uses these to draw its conclusions.‬

‭ he‬ ‭system‬ ‭uses‬ ‭a‬ ‭rule‬ ‭base‬ ‭and‬ ‭an‬ ‭inference‬ ‭engine‬ ‭together‬ ‭to‬ ‭simulate‬ ‭human‬
T
‭reasoning‬‭when‬‭analysing‬‭a‬‭problem‬‭and‬‭arriving‬‭at‬‭a‬‭conclusion.‬‭To‬‭simulate‬‭human‬
‭processes‬ ‭it‬ ‭is‬ ‭necessary‬ ‭to‬ ‭have‬ ‭a‬ ‭vast‬ ‭amount‬ ‭o f‬ ‭information‬ ‭stored‬ ‭in‬ ‭the‬
‭knowledge base and the reasoning set out as a set of rules in the rule base.‬

‭ teps Followed When Producing an Expert System‬


S
‭-‬ ‭Gather information from experts in the field.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭6‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ ‭ esign the knowledge base.‬
D
‭-‬ ‭Input data into knowledge base.‬
‭-‬ ‭Design the rule base.‬
‭-‬ ‭Design inference engine‬
‭-‬ ‭Design display of results‬
‭-‬ ‭Design appropriate user interface‬

‭ ays of Improving Expert Systems‬


W
‭-‬ ‭Frequently carrying out researches and making updates.‬
‭-‬ ‭Quickly inputting new data into the knowledge base.‬
‭-‬ ‭Assigning‬ ‭its‬ ‭control‬ ‭to‬ ‭a‬ ‭number‬ ‭o f‬ ‭highly‬ ‭experienced‬ ‭personnel‬ ‭who‬ ‭will‬
‭monitor and make updates as soon as possible.‬

‭ dvantages of Expert Systems‬


A
‭-‬ ‭Provides consistent answers‬
‭-‬ ‭Fast identification of solutions to problems by quickly analysing data.‬
‭-‬ ‭They produce reliable and accurate results.‬
‭-‬ ‭There‬‭is‬‭no‬‭need‬‭for‬‭an‬‭expert‬‭to‬‭be‬‭present‬‭since‬‭they‬‭can‬‭act‬‭as‬‭a‬‭prompt‬‭to‬‭an‬
‭expert.‬
‭-‬ ‭They can deal with complex situations much faster than humans.‬
‭-‬ ‭They could be used in hazardous areas (e.g. Oil prospecting).‬
‭-‬ ‭They are less likely to make errors.‬
‭-‬ ‭They do not forget as humans do.‬
‭-‬ ‭Many copies can be made at a low cost.‬
‭-‬ ‭Knowledge of several experts is combined.‬
‭-‬ ‭Save costs on wages and salaries for staff.‬

‭ isadvantages of Expert Systems‬


D
‭-‬ ‭They lack creativity.‬
‭-‬ ‭They are unable to learn outside the system.‬
‭-‬ ‭They lack sensory experience.‬
‭-‬ ‭They take time and are difficult to develop.‬
‭-‬ ‭They‬‭need‬‭to‬‭be‬‭constantly‬‭updated‬‭to‬‭keep‬‭pace‬‭with‬‭recent‬‭developments‬‭in‬‭the‬
‭field they are applied.‬
‭-‬ ‭This may be difficult and time consuming to use.‬
‭-‬ ‭Data‬ ‭is‬ ‭entered‬ ‭by‬‭humans‬‭who‬‭may‬‭make‬‭mistakes‬‭in‬‭doing‬‭so.‬‭This‬‭can‬‭lead‬‭to‬
‭incorrect decisions being made‬
‭-‬ ‭lacks common sense in some of the decision making processes‬
‭-‬ ‭cannot‬ ‭adapt‬ ‭to‬‭changing‬‭environments‬‭unless‬‭the‬‭knowledge‬‭base‬‭is‬‭continually‬
‭updated‬
‭-‬ ‭expensive system to develop and set up in the first place‬
‭-‬ ‭needs considerable training to ensure system used correctly by operators‬

‭Mineral and Oil Prospecting (Using expert systems)‬


‭ n‬‭Expert‬‭System‬‭called‬‭prospector‬‭asks‬‭the‬‭user‬‭to‬‭enter‬‭geological‬‭formations‬‭o f‬‭a‬
A
‭particular‬ ‭area‬ ‭such‬ ‭as‬ ‭rock‬ ‭and‬ ‭soil‬ ‭type‬ ‭and‬ ‭then‬ ‭gives‬ ‭advice‬ ‭o n‬ ‭the‬ ‭possible‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭7‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ineral‬ ‭deposits‬ ‭that‬‭can‬‭be‬‭found‬‭in‬‭that‬‭area.‬‭An‬‭interactive‬‭user‬‭screen‬‭appears.‬
m
‭Questions‬‭are‬‭asked‬‭about‬‭geological‬‭profiles.‬‭Answers‬‭to‬‭questions‬‭are‬‭typed‬‭in.‬‭The‬
‭inference engine searches the knowledge base using the rule base.‬
‭Inputs‬
‭Geological data such as rock and soil type‬
‭Processing‬
‭Draws‬ ‭conclusions‬ ‭from‬ ‭rules‬ ‭and‬ ‭facts‬ ‭using‬ ‭geological‬ ‭data‬ ‭entered‬ ‭and‬ ‭the‬
‭mineral data stored in the knowledge base. E.g‬
‭-‬ ‭suggest the probability of finding oil as an output‬
‭-‬ ‭indicates the probable depth of deposits‬
‭-‬ ‭predicts geological deposits above the soil‬
‭-‬ ‭produces contour maps showing concentration of minerals, rocks, etc‬
‭Output‬
‭-‬ ‭Possible mineral deposits that can be found in that area‬
‭-‬ ‭Geological maps‬

‭DATA LOGGING‬
‭ he‬ ‭process‬ ‭o f‬ ‭automatically‬ ‭collecting‬ ‭data‬ ‭from‬ ‭source‬ ‭at‬ ‭set‬ ‭intervals,‬ ‭over‬ ‭a‬
T
‭period‬‭o f‬‭time,‬‭for‬‭use‬‭at‬‭a‬‭later‬‭stage.‬‭A‬‭device‬‭that‬‭automatically‬‭collects‬‭data‬‭from‬
‭source at set intervals for use at a later stage is called a‬‭data logger‬‭.‬

‭Features of Data Loggers:‬


‭●‬ ‭They contain processor inside them.‬
‭●‬ ‭Have‬‭Interface‬‭:‬‭Devices‬‭that‬‭act‬‭as‬‭connection‬‭point‬‭between‬‭data‬‭loggers‬‭and‬
‭the computer.‬
‭●‬ ‭They have own storage facility‬‭: For storage of data‬‭collected from sensors‬
‭●‬ ‭They‬ ‭contain‬ ‭o r‬ ‭are‬ ‭connected‬ ‭to‬ ‭sensors‬ ‭that‬ ‭are‬ ‭used‬ ‭for‬‭collecting‬‭data‬‭in‬
‭analogue‬‭form.‬‭All‬‭physical‬‭properties‬‭can‬‭be‬‭measured‬‭with‬‭sensors‬‭e.g.‬‭light,‬
‭heat, sound, pressure, acidity and humidity.‬
‭Sensor type‬ ‭Purpose‬
‭Mercury Tilt switch‬ ‭Detects if device is tilted, e.g. a vending machine‬
‭Light sensor‬ ‭Detects‬ ‭the‬ ‭intensity‬ ‭o f‬ ‭light‬ ‭(light‬ ‭level),‬‭e.g.‬‭so‬‭as‬‭to‬‭turn‬
‭o n‬‭o r‬‭o ff‬‭street‬‭lights.‬‭Used‬‭also‬‭in‬‭greenhouses,‬‭automatic‬
‭door, traffic control, etc‬
‭Can detect light reflected from a barcode‬
‭Push switch‬ ‭Used‬ ‭to‬ ‭turn‬‭o n‬‭o r‬‭o ff‬‭interior‬‭light,‬‭e.g‬‭inside‬‭a‬‭fridge‬‭if‬‭a‬
‭door is opened or closed‬
‭Temperature sensor‬ ‭Detects‬ ‭temperature‬ ‭levels‬ ‭in‬ ‭central‬ ‭heating‬ ‭systems,‬
‭chemical plants, etc‬
‭Infra-red sensor‬ ‭Used‬ ‭in‬ ‭burglar‬ ‭alarms,‬ ‭counting‬ ‭people,‬ ‭detecting‬ ‭heat‬
‭sources‬
‭Sound sensor‬ ‭Records sound levels from beer halls, houses, etc‬
‭Proximity sensor‬ ‭Detects‬ ‭how‬ ‭close‬ ‭to‬ ‭each‬ ‭o ther‬ ‭are‬ ‭two‬ ‭parts,‬ ‭e.g‬ ‭if‬ ‭a‬
‭window‬ ‭is‬ ‭o pened;‬ ‭an‬ ‭alarm‬ ‭is‬ ‭raised‬ ‭because‬ ‭the‬
‭proximity between the window and the sensor is changed.‬
‭Position sensor‬ ‭Senses‬‭the‬‭angle‬‭o f‬‭an‬‭o bject‬‭from‬‭a‬‭certain‬‭point,‬‭e.g‬‭from‬
‭a robot‬
‭Pressure/motion‬ ‭senses‬‭when‬‭someone‬‭has‬‭walked‬‭over‬‭an‬‭o bject‬‭e.g.‬‭used‬
‭sensor‬ ‭in‬ ‭burglar‬ ‭alarm‬ ‭systems,‬ ‭automatic‬ ‭doors,‬ ‭counting‬
‭vehicles, etc‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭8‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Acoustic sensor‬ ‭ istening‬ ‭to‬ ‭foot‬ ‭steps‬ ‭(in‬ ‭burglar‬ ‭alarms),‬ ‭sound‬ ‭from‬
L
‭broken glass, etc‬
‭pH sensor‬ ‭Measures‬‭the‬‭acidity‬‭o r‬‭alkalinity‬‭o f‬‭o bjects‬‭e.g.‬‭o f‬‭soil‬‭and‬
‭water,‬ ‭in‬ ‭pollution‬ ‭monitoring,‬ ‭chemical‬ ‭process‬ ‭control,‬
‭etc‬
‭Humidity(moisture)‬ ‭Measures‬ ‭humidity‬ ‭(moisture)‬ ‭levels‬ ‭in‬ ‭air,‬ ‭greenhouses,‬
‭sensor‬ ‭irrigation systems, etc‬
‭Distance‬ ‭sensor‬ ‭Measure the distance from one point to another‬
‭(could be proximity)‬
‭Oxygen sensor‬ ‭Used to monitor pollution levels‬

‭‬T
● ‭ hey can be connected to small keyboards or other special reading devices.‬
‭●‬ ‭They‬‭are‬‭connected‬‭to‬‭an‬‭Analogue‬‭to‬‭Digital‬‭Converter‬‭(ADC),‬‭which‬‭converts‬
‭data‬ ‭signals‬ ‭in‬‭continuously‬‭varying‬‭form‬‭(analogue)‬‭collected‬‭by‬‭sensors‬‭into‬
‭discrete (digital) values that can be accepted by the computer.‬

‭ ypes of Data Loggers‬


T
‭a.‬ ‭Data loggers with permanent computer connection‬
‭●‬ ‭These‬ ‭take‬ ‭readings‬ ‭and‬ ‭send‬ ‭them‬ ‭to‬ ‭the‬ ‭computer‬ ‭in‬ ‭o ffices‬ ‭through‬
‭connection cables or through wireless connections.‬
‭●‬ ‭The‬‭time‬‭intervals‬‭(time‬‭between‬‭each‬‭reading)‬‭and‬‭the‬‭period‬‭over‬‭which‬‭the‬
‭logging takes place can vary‬
‭●‬ ‭The computer may process the readings instantly and produce graphs‬
‭●‬ ‭The readings may also be stored on the disk for processing at a later date‬
‭●‬ ‭These are suitable for experiments in laboratories‬

‭b.‬ ‭Data loggers with temporary connections‬


‭●‬ ‭These‬ ‭are‬ ‭not‬ ‭always‬ ‭connected‬ ‭to‬ ‭the‬ ‭computer,‬ ‭but‬ ‭are‬ ‭connected‬ ‭when‬
‭necessary‬
‭●‬ ‭They‬‭are‬‭mostly‬‭used‬‭in‬‭monitoring‬‭environmental‬‭conditions‬‭over‬‭a‬‭period‬‭o f‬
‭time‬
‭●‬ ‭The‬‭time‬‭intervals‬‭(time‬‭between‬‭each‬‭reading)‬‭and‬‭the‬‭period‬‭over‬‭which‬‭the‬
‭logging‬ ‭takes‬ ‭place‬ ‭can‬ ‭vary.‬ ‭The‬ ‭time‬ ‭interval‬ ‭for‬ ‭data‬ ‭logging‬ ‭is‬ ‭the‬ ‭time‬
‭between‬ ‭readings.‬ ‭The‬ ‭logging‬ ‭period‬ ‭is‬ ‭the‬ ‭total‬ ‭length‬ ‭o f‬ ‭time‬ ‭over‬ ‭which‬
‭readings are taken.‬
‭●‬ ‭Reading‬ ‭are‬ ‭stored‬‭by‬‭the‬‭data‬‭logger‬‭and‬‭loaded‬‭into‬‭the‬‭computer‬‭at‬‭a‬‭later‬
‭date for processing‬
‭●‬ ‭They‬ ‭can‬ ‭be‬ ‭used‬ ‭in‬ ‭remote‬ ‭areas‬ ‭(not‬ ‭directly‬ ‭connected‬ ‭to‬ ‭the‬ ‭computer):‬
‭remote data logging‬‭.‬

‭ erforming the data logging process‬


P
‭This can be illustrated by the diagram below:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭9‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

-‭ ‬ ‭ onnect sensor to the interface‬


C
‭-‬ ‭Connect interface to the computer‬
‭-‬ ‭Load data logging software (if not loaded already)‬
‭-‬ ‭Enter time interval (e.g. 30 seconds)‬
‭-‬ ‭Specify total reading time‬
‭-‬ ‭Display results as a list on the screen‬
‭-‬ ‭Produce graphs for analysis of data. Other graphs can be plotted automatically‬
‭-‬ ‭Save data on disk for use at a later date‬
‭-‬ ‭Export data to other applications like spread sheet‬

‭Benefits of computerised data logging‬


‭-‬ ‭Data loggers are a very fast method of data collection than manual methods.‬
‭-‬ ‭Data can be processed immediately (real-time)‬
‭-‬ ‭Data loggers are very accurate than humans in collecting data.‬
‭-‬ ‭Data‬‭loggers‬‭enable‬‭collection‬‭o f‬‭data‬‭o n‬‭events‬‭that‬‭happen‬‭too‬‭quickly‬‭than‬
‭human beings could do.‬
‭-‬ ‭They‬ ‭can‬ ‭also‬ ‭record‬ ‭data‬ ‭o n‬ ‭events‬ ‭that‬ ‭happen‬ ‭too‬ ‭slowly‬ ‭and‬‭boring‬‭for‬
‭human beings to carry‬
‭-‬ ‭Data loggers stored data for a very long period of time.‬
‭-‬ ‭Data‬‭loggers‬‭can‬‭work‬‭24‬‭hours‬‭a‬‭day,‬‭thus‬‭ensuring‬‭continuous‬‭data‬‭logging‬
‭process.‬

‭MONITORING AND CONTROL SYSTEMS‬


‭ ONITORING SYSTEM‬‭:‬
M
‭A‬ ‭computer‬ ‭program‬ ‭that‬ ‭keeps‬ ‭track‬ ‭and‬ ‭verifies‬ ‭the‬ ‭o perations‬ ‭o f‬ ‭a‬
‭data-processing‬ ‭system‬ ‭and‬ ‭warn‬ ‭the‬ ‭user‬ ‭if‬ ‭an‬ ‭anomaly‬ ‭o ccurs,‬ ‭e.g.‬ ‭patient‬
‭monitoring‬ ‭in‬ ‭hospital,‬ ‭monitoring‬ ‭key‬ ‭parameters‬ ‭in‬ ‭chemical‬ ‭and‬ ‭nuclear‬ ‭plants,‬
‭monitoring‬‭for‬‭intruders‬‭in‬‭houses‬‭using‬‭burglar‬‭alarms,‬‭etc.‬‭In‬‭monitoring,‬‭there‬‭is‬
‭human intervention. In a monitoring system:‬
‭-‬ ‭computer system takes information from the sensors‬
‭-‬ ‭data from sensors is converted to digital form using the ADC‬
‭-‬ ‭processor compares the data from sensors with stored values (parameters)‬
‭-‬ ‭system informs the user of status either by read outs‬
‭-‬ ‭if‬ ‭values‬ ‭are‬ ‭within‬ ‭acceptable‬ ‭parameters,‬ ‭nothing‬ ‭is‬ ‭done‬ ‭and‬ ‭monitoring‬
‭continues‬
‭-‬ ‭if‬ ‭values‬ ‭are‬ ‭o utside‬ ‭acceptable‬ ‭parameters,‬ ‭the‬ ‭system‬ ‭warns‬ ‭o r‬ ‭alarms‬ ‭if‬
‭values are outside set parameters.‬
‭-‬ ‭can update files but no changes to the process are done during monitoring‬

‭Examples of monitoring systems include:‬


‭-‬ ‭Patient monitoring in hospitals‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭10‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ M ‭ onitoring scientific experiments in laboratories‬
‭-‬ ‭A burglar alarm system‬
‭-‬ ‭Environmental monitoring (oxygen or pollution level in river)‬

‭Monitoring Oxygen Levels in a River (Environmental Monitoring)‬

‭-‬ S‭ ensors‬ ‭read‬ ‭data‬ ‭from‬ ‭the‬ ‭river‬ ‭(Oxygen‬ ‭level,‬ ‭acidity‬ ‭level,‬ ‭using‬ ‭the‬ ‭pH‬
‭sensor)‬
‭-‬ ‭Data from sensors is converted to digital form‬
‭-‬ ‭Computer stores received data‬
‭-‬ ‭Oxygen‬‭and‬‭acidity‬‭levels‬‭from‬‭sensors‬‭are‬‭compared‬‭with‬‭historically‬‭stored‬
‭(pre-set values/parameters)‬
‭-‬ ‭Either data can be transferred to CD/DVD/Memory stick for later analysis OR‬
‭-‬ ‭Data‬‭is‬‭send‬‭to‬‭the‬‭monitoring‬‭station‬‭directly‬‭through‬‭mobile‬‭phone‬‭network‬
‭o r through cables.‬
‭-‬ ‭Red‬‭colour‬‭is‬‭displayed‬‭o n‬‭screen‬‭if‬‭values‬‭are‬‭o utside‬‭acceptable‬‭level‬‭o r‬‭an‬
‭alarm is sound.‬

‭Monitoring of Patient’s Vital Signs in Hospital‬


‭-‬ ‭Sensors‬ ‭read‬ ‭key‬ ‭vital‬ ‭signs‬ ‭(e.g.‬ ‭pulse/heart‬ ‭rate,‬ ‭temperature,‬ ‭blood‬
‭pressure, respiration, etc.)‬
‭-‬ ‭The data from sensors is converted to digital form using ADC‬
‭-‬ ‭The data is stored in computer memory‬
‭-‬ ‭The computer compares data from sensors with pre-set parameters‬
‭-‬ ‭The results are output on the screen in form of graphs or digital read outs.‬
‭-‬ ‭An alarm is activated if any of the data is outside acceptable parameters‬
‭-‬ ‭The system continues to monitor the patient until the computer is tuned off.‬

‭ hese‬ ‭systems‬ ‭are‬ ‭designed‬ ‭to‬ ‭monitor‬ ‭critically‬ ‭ill‬ ‭patients‬ ‭o r‬ ‭premature‬ ‭babies.‬
T
‭Some‬‭biosensors‬‭connected‬‭to‬‭the‬‭computer‬‭are‬‭attached‬‭to‬‭the‬‭patient‬‭for‬‭tracking‬
‭and‬ ‭recording‬ ‭vital‬ ‭signs‬ ‭such‬ ‭as‬ ‭heart‬ ‭beat,‬‭blood‬‭pressure‬‭and‬‭brain‬‭activity.‬‭The‬
‭biosensors‬ ‭will‬ ‭transmit‬ ‭readings‬ ‭to‬ ‭the‬ ‭central‬ ‭computer‬ ‭should‬ ‭the‬ ‭situation‬ ‭go‬
‭beyond a critical warning level and:‬
‭-‬ ‭issue a warning on the computer display for nurses on standby‬
‭-‬ ‭sound a warning siren, beep or sound to alert medical staff‬
‭-‬ ‭flash a light to draw attention of medical staff‬

‭ atients‬‭in‬‭intensive‬‭care‬‭are‬‭monitored‬‭through‬‭sensors.‬‭The‬‭sensors‬‭measure‬‭and‬
P
‭give feedback pertaining to: blood pressure, temperature level, weight, pulse rate, etc.‬
‭The‬ ‭computer‬ ‭is‬ ‭pre-set‬ ‭with‬ ‭normal‬ ‭range‬ ‭o f‬ ‭values.‬ ‭It‬ ‭compares‬ ‭these‬ ‭with‬
‭feedback from sensors.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭11‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ omputers‬ ‭record‬ ‭patients’‬ ‭medical‬ ‭data‬ ‭over‬ ‭some‬ ‭time‬ ‭for‬ ‭later‬ ‭analysis.‬ ‭Data‬
C
‭recorded includes:‬
‭-‬ ‭Taking‬‭measurements‬‭o n‬‭patients,‬‭for‬‭instance:‬‭blood‬‭pressure,‬‭temperature‬
‭level,‬ ‭weight,‬ ‭pulse‬ ‭rate‬ ‭etc.‬ ‭This‬ ‭relieves‬ ‭nurses‬ ‭o f‬ ‭some‬ ‭duties‬ ‭that‬ ‭will‬ ‭be‬
‭boring, making them faster and more reliable.‬
‭-‬ ‭There‬ ‭are‬ ‭however‬ ‭some‬ ‭hospital‬ ‭tasks‬ ‭that‬ ‭are‬ ‭more‬ ‭suitable‬ ‭for‬ ‭human‬
‭beings‬ ‭to‬ ‭perform‬ ‭than‬ ‭computers.‬ ‭These‬ ‭include‬ ‭dressing‬ ‭patients,‬ ‭bathing‬
‭patients, etc.‬

‭In hospitals, computers also perform the following:‬


‭-‬ ‭Used to‬‭hold data‬‭for children‘s immunisation processes.‬
‭-‬ ‭Monitoring‬ ‭o f‬ ‭patients‬ ‭during‬ ‭surgery‬ ‭as‬ ‭they‬ ‭control‬ ‭body‬ ‭scanners‬ ‭and‬
‭sensors.‬
‭-‬ ‭For Stock control :‬‭For hospital blood stocks, food‬‭stocks, drug stocks, etc‬
‭-‬ ‭For‬ ‭patient‬ ‭Booking‬ ‭system‬ ‭:‬ ‭For‬ ‭o ut-patients‬ ‭and‬ ‭in-patients‬ ‭to‬ ‭see‬ ‭the‬
‭doctor‬
‭-‬ ‭For‬ ‭keeping‬‭Personnel‬‭records‬‭:‬‭For‬‭keeping‬‭and‬‭management‬‭o f‬‭employee‬
‭records‬

‭Surveillance Systems for House Breakers‬


‭ he‬ ‭interaction‬ ‭between‬ ‭sensors‬ ‭and‬ ‭microprocessor‬ ‭in‬‭a‬‭surveillance‬‭system‬‭is‬‭as‬
T
‭follows:‬
‭-‬ ‭sensors around the house would gather information‬
‭-‬ ‭e.g. has a light beam been broken‬
‭-‬ ‭has pressure pad detected excess pressure‬
‭-‬ ‭has infra-red beam detected excess heat‬
‭-‬ ‭has acoustic sensor detected any noise such as breaking glass‬
‭-‬ ‭data translated into digital using an ADC (analogue to digital converter)‬
‭-‬ ‭microprocessor/computer‬ ‭will‬ ‭compare‬ ‭signal‬ ‭from‬ ‭sensor‬ ‭with‬ ‭stored‬
‭information‬
‭-‬ ‭e.g. signal that light beam is broken‬
‭pressure > stored “normal” value‬
‭heat level > stored “normal” value‬
‭acoustic level > “stored” normal value‬
‭-‬ ‭if‬ ‭any‬ ‭values‬ ‭are‬ ‭o utside‬ ‭normal‬ ‭range,‬ ‭microprocessor/computer‬ ‭sends‬ ‭a‬
‭signal to an alarm and/or flashing light‬
‭-‬ ‭system also automatically sends signal to police/security company‬
‭-‬ ‭since‬ ‭the‬ ‭house‬ ‭is‬ ‭large,‬ ‭sensors‬ ‭will‬ ‭be‬ ‭in‬ ‭zones;‬ ‭therefore‬ ‭computer‬ ‭will‬
‭indicate on a control panel the zone where intruder broke in‬

‭ ONTROL SYSTEM‬
C
‭-‬ ‭It‬ ‭is‬ ‭a‬‭system‬‭in‬‭which‬‭o ne‬‭o r‬‭more‬‭computers‬‭are‬‭used‬‭to‬‭monitor‬‭and‬‭regulate‬
‭the operations of non-computer equipment like in oil refineries.‬
‭-‬ ‭Control‬‭systems‬‭involve‬‭monitoring‬‭and‬‭logging‬‭o f‬‭physical‬‭quantities,‬‭provide‬‭an‬
‭analysis of performance and allows some user interaction.‬
‭-‬ ‭Feedback is an essential element as well as timing.‬
‭-‬ ‭Most‬ ‭control‬ ‭systems‬ ‭are‬ ‭real-time‬ ‭systems,‬ ‭e.g.‬ ‭in‬ ‭o il‬ ‭refining,‬ ‭chemical‬
‭processing,‬ ‭traffic‬ ‭lights‬ ‭(controlling‬ ‭the‬ ‭sequence‬ ‭o f‬ ‭lights‬ ‭to‬ ‭maintain‬‭o ptimum‬
‭traffic‬ ‭flow),‬ ‭chemical‬ ‭and‬ ‭nuclear‬ ‭plants‬ ‭(opening‬ ‭and‬ ‭closing‬ ‭valves,‬ ‭safety‬
‭systems, etc.), etc.‬
‭-‬ ‭In computer control:‬
‭✔‬ ‭computer system takes information from the sensors‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭12‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ ‬ c‭ ompares the data with stored values‬
‭✔‬ ‭Takes‬ ‭action‬ ‭to‬ ‭try‬ ‭to‬ ‭get‬ ‭values‬ ‭within‬ ‭acceptable‬ ‭ranges‬ ‭by‬‭sending‬
‭signals‬‭to‬‭devices‬‭to‬‭o pen/close,‬‭o n/off‬‭etc.‬‭Devices‬‭that‬‭receive‬‭signals‬
‭include valves, motors, windows, tapes, etc.‬
‭✔‬ ‭o utput from system can affect next input (feedback)‬

‭Examples of control systems include:‬


‭-‬ ‭controlling a nuclear reactor‬
‭-‬ ‭controlling a chemical process‬
‭-‬ ‭controlling a greenhouse environment‬
‭-‬ ‭controlling central heating system‬
‭-‬ ‭controlling a set of traffic lights‬

‭Components of Computer Control‬


‭-‬‭A‬‭computer‬‭(or microprocessor).‬
‭-‬‭Sensors‬ ‭to‬ ‭enable‬ ‭the‬ ‭computer‬ ‭to‬ ‭detect‬ ‭quantities‬ ‭such‬ ‭as‬ ‭temperature‬ ‭o r‬
‭pressure.‬
‭-‬‭Motor‬‭:‬ ‭Devices‬ ‭which‬ ‭actually‬ ‭turns‬ ‭o n‬ ‭o r‬ ‭o ff‬ ‭o ther‬ ‭devices,‬ ‭e.g‬ ‭power‬ ‭supply,‬
‭windows, vents, water pipes‬
‭-‬‭Devices‬‭for the computer to turn on and off.‬
‭-‬‭An‬‭interface‬‭to connect the sensors and devices to‬‭the computer.‬
‭-‬‭software‬‭to read data from the sensors and turn the‬‭devices on and off‬

‭How control is done‬


‭-‬ ‭Sensors gather information from the environment in analogue form.‬
‭-‬ ‭The ADC translates the analogue data into digital form‬
‭-‬ ‭The‬‭microprocessor‬‭compares‬‭the‬‭incoming‬‭data‬‭with‬‭the‬‭data‬‭values‬‭already‬
‭stored in memory.‬
‭-‬ ‭If‬ ‭values‬ ‭are‬‭o utside‬‭set‬‭parameters,‬‭the‬‭computer‬‭sends‬‭a‬‭signal‬‭to‬‭a‬‭device‬
‭to‬‭switch‬‭o n‬‭o r‬‭o ff‬‭(e.g.‬‭if‬‭controlling‬‭a‬‭central‬‭heating‬‭system,‬‭if‬‭temperature‬
‭>‬‭set‬‭temperature‬‭a‬‭heater‬‭will‬‭be‬‭switched‬‭o ff‬‭and/or‬‭a‬‭cooling‬‭fan‬‭switched‬
‭o n;‬‭if‬‭the‬‭temperature‬‭is‬‭below‬‭the‬‭set‬‭point‬‭then‬‭the‬‭heating‬‭will‬‭be‬‭switched‬
‭o n and/or a cooling fan switched off).‬
‭-‬ ‭The‬ ‭digital‬ ‭signal‬ ‭will‬ ‭be‬ ‭converted‬ ‭to‬ ‭analogue‬‭form‬‭using‬‭a‬‭DAC‬‭(Digital‬‭to‬
‭Analogue‬ ‭Converter).‬ ‭Actuators‬ ‭are‬ ‭usually‬‭employed‬‭to‬‭o perate‬‭devices‬‭like‬
‭valves, heaters, etc.‬
‭-‬ ‭The‬ ‭computer/microprocessor‬ ‭system‬ ‭will‬ ‭continually‬ ‭monitor‬ ‭the‬ ‭data‬
‭coming from the sensors‬

‭ B‬‭:‬ ‭In‬ ‭chemical‬ ‭and‬‭nuclear‬‭plants,‬‭there‬‭is‬‭o ften‬‭a‬‭combination‬‭o f‬‭monitoring‬‭and‬


N
‭control‬‭taking‬‭place.‬‭Information‬‭from‬‭sensors‬‭is‬‭o ften‬‭displayed‬‭o n‬‭a‬‭control‬‭panel‬
‭where‬ ‭o perators‬ ‭can‬ ‭see‬‭key‬‭values‬‭and‬‭alarm‬‭conditions‬‭(e.g.‬‭if‬‭a‬‭system‬‭monitors‬
‭temperatures‬ ‭and‬ ‭110‬‭0‬‭C‬ ‭is‬ ‭the‬ ‭normal‬ ‭temperature‬ ‭and‬ ‭120‬‭0‭C ‬
‬ ‭is‬ ‭the‬ ‭alarm‬
‭temperature,‬ ‭the‬ ‭control‬ ‭panel‬ ‭will‬ ‭show‬ ‭normal,‬ ‭present‬ ‭and‬ ‭alarm‬ ‭values‬ ‭in‬ ‭the‬
‭form‬‭o f‬‭read‬‭o uts‬‭–‬‭either‬‭the‬‭computer‬‭will‬‭automatically‬‭take‬‭action‬‭if‬‭necessary‬‭o r‬
‭the operator will take action (override the system if necessary)‬

‭Chemical Process Control‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭13‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ onsider the following situation:‬
C
‭A‬ ‭chemical‬ ‭process‬ ‭o nly‬ ‭works‬ ‭if‬ ‭temperature‬ ‭is‬ ‭above‬ ‭70‬‭o‬‭C‬ ‭and‬ ‭less‬ ‭than‬ ‭100‬‭o‭C ‬
,‬
‭and‬ ‭the‬ ‭pH‬ ‭(acidity)‬ ‭level‬ ‭is‬ ‭between‬ ‭3.5‬ ‭and‬ ‭8.5.‬ ‭The‬ ‭heater‬ ‭is‬ ‭used‬ ‭to‬ ‭warm‬ ‭the‬
‭reactor‬‭and‬‭valves‬‭are‬‭used‬‭to‬‭add‬‭acid‬‭when‬‭necessary‬‭to‬‭maintain‬‭the‬‭acidity.‬‭The‬
‭following is a description of how the sensors and the computer in this system works:‬
‭-‬ ‭Temperature‬‭and‬‭c hemical sensors‬‭read data from the‬‭chemical process‬
‭-‬ ‭Data from these sensors is‬‭converted to digital form‬‭using ADC‬
‭-‬ ‭Computer‬ ‭compares‬ ‭values‬ ‭from‬ ‭sensors‬ ‭with‬ ‭pre-set‬ ‭data‬ ‭in‬ ‭computer‬
‭memory‬
‭■‬ ‭If temperature is too low, a signal is send to switch on heaters‬
‭■‬ ‭If temperature is too high, a signal is send to switch off heaters‬
‭■‬ ‭If temperature is within acceptable range, no action is taken‬
‭■‬ ‭If pH is too high, signal is send to open valve and acid is added‬
‭■‬ ‭If pH is too low, signal is send to close valve‬
‭■‬ ‭If pH is within acceptable levels, no action is taken‬
‭■‬ ‭Signals‬ ‭are‬ ‭changed‬ ‭from‬ ‭digital‬ ‭to‬ ‭analogue‬ ‭so‬ ‭as‬ ‭to‬‭control‬‭heaters‬
‭and valves‬
‭-‬ ‭This continues as long as the computer is activated.‬

‭Control in Greenhouses‬
‭-‬ T ‭ he‬ ‭environment‬ ‭must‬ ‭be‬ ‭kept‬ ‭constant‬ ‭if‬ ‭plants‬ ‭are‬ ‭to‬ ‭grow‬ ‭successfully‬ ‭in‬
‭greenhouses.‬
‭-‬ ‭Temperature‬ ‭and‬ ‭humidity‬ ‭in‬ ‭the‬ ‭air‬ ‭needs‬ ‭to‬ ‭be‬ ‭controlled‬ ‭so‬ ‭that‬ ‭it‬ ‭is‬ ‭kept‬
‭constant‬
‭-‬ ‭Sensors‬ ‭are‬ ‭used‬ ‭to‬ ‭record‬ ‭humidity‬ ‭and‬ ‭temperature‬ ‭levels‬ ‭in‬ ‭analogue‬ ‭form.‬
‭The analogue signals are sent to the computer‬
‭-‬ ‭The‬ ‭computer‬ ‭will‬‭have‬‭stored‬‭(pre-set)‬‭values‬‭o f‬‭minimum‬‭acceptable‬‭level‬‭and‬
‭maximum acceptable level for both temperature and humidity‬
‭-‬ ‭If‬ ‭the‬ ‭sensor‬ ‭records‬ ‭humidity‬ ‭level‬ ‭below‬ ‭the‬ ‭minimum‬ ‭acceptable‬ ‭level,‬ ‭the‬
‭computer‬‭will‬‭send‬‭signal‬‭to‬‭the‬‭actuator‬‭to‬‭close‬‭the‬‭windows‬‭and‬‭switch‬‭o n‬‭the‬
‭pump‬‭for‬‭a‬‭certain‬‭period‬‭o f‬‭time,‬‭which‬‭will‬‭spray‬‭water‬‭as‬‭a‬‭fine‬‭mist‬‭inside‬‭the‬
‭greenhouse.‬
‭-‬ ‭Too‬ ‭much‬ ‭humidity‬ ‭will‬ ‭cause‬ ‭the‬ ‭processor‬ ‭to‬ ‭send‬ ‭signals‬ ‭to‬ ‭the‬ ‭actuator‬ ‭to‬
‭o pen windows to assist ventilation and drying out air.‬
‭-‬ ‭In‬ ‭case‬ ‭o f‬ ‭temperature,‬ ‭if‬ ‭the‬ ‭greenhouse‬ ‭becomes‬ ‭too‬ ‭hot,‬ ‭the‬ ‭windows‬ ‭are‬
‭o pened‬ ‭and‬ ‭heater‬ ‭turned‬ ‭o ff.‬ ‭If‬ ‭it‬ ‭becomes‬ ‭too‬ ‭cold,‬ ‭windows‬ ‭are‬ ‭closed‬ ‭and‬
‭heater switched on.‬

I‭ nputs‬‭:‬
‭Humidity/moisture (collected from humidity/moisture sensor),‬
‭Temperature (all in analogue form; collected from temperature sensor)‬

‭Processing‬‭:‬
‭-‬ ‭detecting temperature/humidity level‬
‭-‬ ‭Processors‬‭compares‬‭pre-set‬‭values‬‭in‬‭the‬‭computer‬‭with‬‭data‬‭collected‬‭from‬
‭sensors‬
‭-‬ ‭Processor‬ ‭instructs‬ ‭actuator‬ ‭to‬ ‭take‬ ‭action‬ ‭if‬ ‭values‬ ‭exceed‬ ‭o r‬ ‭are‬ ‭less‬‭than‬
‭minimum/maximum pre-set values‬
‭Outputs:‬
‭-‬ ‭Windows open or closed (digital form)‬
‭-‬ ‭Heater on or off (digital)‬
‭-‬ ‭Pump for water supply on or off (digital)‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭14‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Computerised Traffic Control System‬


‭Input:‬
‭-‬ ‭Data‬ ‭is‬ ‭read‬ ‭from‬ ‭sensors(light‬ ‭sensor,‬ ‭motion/pressure‬ ‭sensor,‬ ‭weight‬
‭sensor, sound sensor, etc)‬
‭-‬ ‭Data is read from camera images‬
‭Processing:‬
‭-‬ ‭Computers analyse data from sensors.‬
‭-‬ ‭Computers calculate average traffic flow and speed.‬
‭-‬ ‭Computer sends signals to actuators to adjust change of lights and timing‬
‭Output:‬
‭-‬ ‭Change of lights at junction.‬
‭-‬ ‭change timing plan‬

‭ dvantages of using computerised traffic control systems‬


A
‭-‬ ‭Ensures improved traffic flow control.‬
‭-‬ ‭Reduces traffic accidents.‬
‭-‬ ‭Keeps delays to a minimum.‬
‭-‬ ‭Reduces pollution. cars use less fuel‬

I‭ n‬ ‭c ase‬‭of‬‭an‬‭emergency,‬‭the‬‭computerised‬‭traffic‬‭system‬‭may‬‭perform‬‭any‬‭one‬
‭of the following:‬
‭-‬ ‭Give uninterrupted path through the system of linked traffic lights.‬
‭-‬ ‭Give green link – wave for all traffic to pass.‬
‭-‬ ‭Turn all lights to red.‬
‭-‬ ‭Activate emergency generator.‬
‭-‬ ‭Sound an alarm.‬

‭Microprocessor-Controlled Streetlights‬
‭Input:‬
‭-‬ ‭Pre-set values of Sunset time and Sunrise time‬
‭-‬ ‭Light‬ ‭level‬ ‭(Light‬‭sensor‬‭sends‬‭measurement‬‭o f‬‭light‬‭to‬‭microprocessor,‬‭ADC‬
‭converts this to digital)‬
‭Processing:‬
‭-‬ ‭Processor compares sunrise time, sunset time and current time.‬
‭-‬ ‭If‬‭sunrise‬‭time‬‭=‬‭current‬‭time‬‭o r‬‭higher,‬‭the‬‭processor‬‭send‬‭signal‬‭to‬‭actuator‬
‭so that it switches off lights, else,‬
‭-‬ ‭if‬ ‭signal‬ ‭equals‬ ‭sun‬ ‭set‬ ‭time,‬ ‭the‬ ‭processor‬ ‭send‬ ‭signal‬‭to‬‭actuator‬‭so‬‭that‬‭it‬
‭switches on light.‬
‭-‬ ‭Also‬ ‭the‬ ‭amount‬ ‭o f‬ ‭light‬ ‭is‬ ‭compared‬ ‭with‬ ‭pre-set‬ ‭value.‬ ‭If‬‭higher‬‭–‬‭nothing‬
‭happens,‬ ‭If‬ ‭lower‬ ‭o r‬ ‭equal‬ ‭sends‬ ‭signal‬ ‭to‬ ‭send‬ ‭signal‬ ‭to‬ ‭actuator‬ ‭so‬ ‭that‬‭it‬
‭switches on the streetlights.‬
‭Output:‬
‭Lights switched on or off‬

‭Benefits of Monitoring and Control Systems‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭15‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ I‭ t‬ ‭is‬ ‭safer‬ ‭to‬ ‭use‬ ‭computer‬ ‭control‬ ‭than‬ ‭human‬ ‭beings,‬ ‭e.g.‬ ‭in‬ ‭monitoring‬
‭temperature‬ ‭in‬ ‭a‬ ‭blast‬ ‭furnace,‬ ‭monitoring‬ ‭radiation‬ ‭level‬ ‭in‬ ‭a‬ ‭nuclear‬ ‭reactor,‬
‭etc.‬
‭-‬ ‭It‬‭is‬‭faster‬‭to‬‭respond‬‭to‬‭problems‬‭that‬‭may‬‭affect‬‭the‬‭system,‬‭e.g.‬‭nuclear‬‭reactor‬
‭can automatically shut down in response to earthquake‬
‭-‬ ‭They don’t get tired, thus computers can work 24/7‬
‭-‬ ‭Computer‬‭systems‬‭do‬‭not‬‭miss‬‭key‬‭data‬‭that‬‭must‬‭be‬‭entered‬‭into‬‭the‬‭system‬‭as‬
‭humans do.‬
‭-‬ ‭Computer‬ ‭control‬ ‭is‬ ‭more‬ ‭reliable‬ ‭than‬ ‭human‬ ‭beings‬ ‭as‬ ‭computer‬ ‭does‬ ‭not‬
‭forget to take readings‬
‭-‬ ‭computers‬ ‭are‬ ‭more‬ ‭accurate‬ ‭and‬ ‭can‬ ‭take‬ ‭more‬ ‭frequent‬ ‭readings‬ ‭(e.g.‬ ‭if‬
‭readings‬‭need‬‭to‬‭be‬‭taken‬‭every‬‭30‬‭seconds,‬‭humans‬‭can‬‭make‬‭mistakes‬‭o r‬‭miss‬
‭readings or even find it impossible to take readings at such short time intervals)‬
‭-‬ ‭data‬‭can‬‭be‬‭automatically‬‭displayed‬‭and‬‭analysed‬‭without‬‭the‬‭need‬‭to‬‭enter‬‭data‬
‭manually (which in itself could introduce errors into the system)‬
‭-‬ ‭Data can be automatically stored and used in other programs.‬
‭-‬ ‭The‬‭results‬‭o f‬‭the‬‭system‬‭can‬‭be‬‭automatically‬‭stored‬‭in‬‭a‬‭spread-sheet‬‭package‬
‭o r a database package for future reference.‬
‭-‬ ‭Computer’s‬ ‭response‬ ‭time‬ ‭is‬ ‭faster,‬ ‭which‬ ‭is‬ ‭important‬ ‭especially‬ ‭in‬ ‭patient‬
‭monitoring‬

‭Disadvantages of Monitoring and Control Systems‬


‭-‬ ‭High‬ ‭initial‬ ‭costs‬ ‭because‬ ‭computer-controlled‬ ‭devices‬ ‭are‬ ‭more‬ ‭expensive‬ ‭to‬
‭buy and to set up.‬
‭-‬ ‭Fewer‬ ‭workers‬ ‭will‬ ‭be‬ ‭employed‬ ‭leading‬ ‭to‬ ‭a‬ ‭rise‬ ‭in‬ ‭the‬ ‭numbers‬ ‭o f‬ ‭the‬
‭unemployed.‬
‭-‬ ‭The software for the control system is very expensive‬
‭-‬ ‭If the computer malfunctions the system will not work‬
‭-‬ ‭If there is a power cut the system will not work‬
‭-‬ ‭The‬ ‭computer‬ ‭can’t‬ ‭react‬ ‭to‬ ‭unexpected‬ ‭events‬ ‭like‬ ‭a‬ ‭human‬ ‭could.‬ ‭It‬ ‭can‬‭o nly‬
‭respond in the way it has been programmed to.‬
‭-‬ ‭It‬ ‭can‬ ‭cause‬ ‭some‬ ‭concern‬ ‭if‬ ‭total‬ ‭control‬ ‭for‬ ‭a‬ ‭system‬ ‭and‬ ‭the‬ ‭decisions‬ ‭are‬
‭handed over to a computer.‬

‭ UTOMATED SYSTEMS‬
A
‭-‬ ‭These‬ ‭are‬ ‭control‬ ‭systems‬ ‭that‬ ‭are‬ ‭dedicated‬ ‭to‬ ‭o ne‬‭particular‬‭task‬‭and‬‭lack‬‭the‬
‭ability to collect and analyse data as in digital cameras.‬
‭-‬ ‭They‬ ‭do‬‭not‬‭allow‬‭for‬‭o r‬‭act‬‭o n‬‭user‬‭interaction,‬‭e.g.‬‭washing‬‭machines,‬‭cameras,‬
‭watches.‬
‭-‬ ‭Most control systems have embedded computers systems inside them.‬

‭ B: Embedded Computers:‬‭–‬
N
‭-‬ ‭Refers‬ ‭to‬ ‭use‬ ‭o f‬ ‭microprocessors‬ ‭in‬ ‭non-computer‬ ‭equipment‬ ‭like‬ ‭in‬ ‭cameras,‬
‭washing machines, watches, etc. They do not have mouse, monitor and keyboards.‬
‭-‬ ‭These‬‭are‬‭normally‬‭dedicated‬‭for‬‭a‬‭specific‬‭task‬‭they‬‭are‬‭designed‬‭for.‬‭Embedded‬
‭computers‬ ‭are‬ ‭also‬ ‭found‬ ‭in‬ ‭household‬ ‭items‬ ‭like‬ ‭camera,‬ ‭microwave,‬ ‭washing‬
‭machine,‬ ‭video‬‭recorder,‬‭fridge,‬‭sewing‬‭machine,‬‭air‬‭conditioning,‬‭electronic‬‭toys,‬
‭rice cooker dish washer, Televisions, alarms, clock, radio, DVD players, etc.‬

‭Refrigerators‬
‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭16‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Inputs‬‭:‬
‭-‬ ‭temperature‬ ‭level‬ ‭(from‬ ‭temperature‬ ‭sensor/‬ ‭o r‬ ‭entered‬ ‭manually‬ ‭through‬
‭the number pad),‬
‭-‬ ‭Pressure (from pressure sensor/contact switch/push switch) ,‬
‭-‬ ‭push switch setting‬
‭Processing‬‭:‬
‭-‬ ‭Analogue data from sensors is converted to digital by the ADC‬
‭-‬ ‭Processor controls temperature level by comparing with pre-set values.‬
‭-‬ ‭If‬ ‭temperature‬ ‭is‬ ‭higher‬ ‭than‬ ‭pre-set‬ ‭value,‬ ‭the‬ ‭processor‬ ‭sends‬ ‭signal‬ ‭to‬
‭motor to switch on compressor‬
‭-‬ ‭If not higher, the compressor is switched off by the actuator‬
‭-‬ ‭Processor controls the display panel.‬
‭-‬ ‭Processor‬‭sends‬‭signals‬‭to‬‭display‬‭panel‬‭and‬‭to‬‭the‬‭motor‬‭to‬‭switch‬‭lights‬‭o n‬
‭o r off.‬
‭Outputs‬
‭-‬ ‭Switch on lights if door is opened and off when closed‬
‭-‬ ‭Light‬ ‭emitting‬ ‭diodes‬ ‭indicating‬ ‭current‬ ‭temperature‬ ‭o f‬ ‭the‬ ‭inside‬ ‭o f‬
‭refrigerator.‬
‭-‬ ‭A warning buzzer (sound) if light is left open.‬
‭-‬ ‭Cold temperature‬

‭Air Conditioners‬
‭Inputs‬‭:‬
‭-‬ ‭Pre-set temperature level‬
‭-‬ ‭Temperature from temperature sensors‬
‭-‬ ‭Pressure from pressure sensors: monitors pressure of refrigerant‬
‭Processing‬
‭-‬ ‭Processor controls temperature.‬
‭-‬ ‭Processor sends signal to motor to change fan speed‬
‭-‬ ‭If‬‭temperature‬‭is‬‭below‬‭pre-set‬‭value,‬‭the‬‭processor‬‭gives‬‭motor‬‭signal‬‭so‬‭that‬
‭it switches off fans‬
‭-‬ ‭If‬‭temperature‬‭is‬‭above‬‭pre-set‬‭value,‬‭the‬‭processor‬‭gives‬‭motor‬‭signal‬‭so‬‭that‬
‭it switches on fans‬
‭-‬ ‭Processor controls timing and the display panel‬
‭Output‬
‭-‬ ‭Cool temperatures in the room‬
‭-‬ ‭Fans switched off or on depending on the situation‬

‭Digital Camera‬‭:‬
‭Input‬‭:‬
‭-‬ ‭Light mode( night or day mode)‬
‭-‬ ‭Film speed‬
‭-‬ ‭Colour setting‬
‭Processing‬‭:‬
‭-‬ ‭Processor sends signal to automatically adjust film speed,‬
‭-‬ ‭Processor positions the end of film,‬
‭-‬ ‭Processor sends signal to adjust distance from object,‬
‭-‬ ‭Processor sends signal to adjusts light.‬
‭-‬ ‭Processor sends signal to save image on the memory card‬

‭Output‬
‭-‬ ‭Sound to indicate that the film/picture has been taken‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭17‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ I‭ mage/film captured and stored‬
‭-‬ ‭Light flashed to indicate film/picture is taken‬

‭Speed Cameras‬
‭ hese‬‭are‬‭used‬‭o n‬‭roads‬‭to‬‭take‬‭photographs‬‭o f‬‭cars‬‭which‬‭have‬‭exceeded‬‭the‬‭speed‬
T
‭limit.‬ ‭Some‬ ‭o f‬ ‭these‬ ‭cameras‬ ‭use‬ ‭microprocessor‬ ‭controlled‬ ‭chips‬ ‭to‬ ‭store‬
‭information.‬
‭The‬ ‭advantages‬ ‭of‬ ‭speed‬ ‭c ameras‬ ‭with‬ ‭microprocessor‬ ‭controlled‬ ‭c hips‬ ‭are‬
‭that:‬
‭-‬ ‭Data and images can be transferred automatically which will be faster.‬
‭-‬ ‭Image can be viewed straight away.‬
‭-‬ ‭Can store considerably more data and photos.‬
‭-‬ ‭Can store other information (apart from photo image) e.g. road conditions.‬
‭-‬ ‭Chips can be re-used.‬

‭Inputs‬
‭-‬ ‭Maximum speed (speed limits)‬
‭-‬ ‭Road condition‬

‭ rocessing:‬
P
‭Tasks‬ ‭which‬ ‭would‬ ‭be‬ ‭c arried‬ ‭out‬ ‭by‬ ‭the‬ ‭microprocessor‬ ‭as‬ ‭a‬ ‭speeding‬ ‭c ar‬
‭approaches a camera include:‬
‭-‬ ‭Sense and record speed of vehicle.‬
‭-‬ ‭Compare‬ ‭speed‬ ‭o f‬ ‭vehicle‬ ‭with‬ ‭stored‬ ‭value(s)‬ ‭and‬ ‭decide‬ ‭whether‬
‭photograph should be taken.‬
‭-‬ ‭Check on value of light intensity.‬
‭-‬ ‭Adjust focal length, focus image, adjust shutter speed and set exposure.‬
‭Tasks‬ ‭which‬ ‭would‬ ‭be‬ ‭c arried‬‭out‬‭by‬‭the‬‭microprocessor‬‭as‬‭the‬‭photograph‬‭is‬
‭being taken include:‬
‭-‬ ‭Log the time.‬
‭-‬ ‭Log the date.‬
‭-‬ ‭Log the speed.‬
‭-‬ ‭Record the road conditions.‬
‭-‬ ‭Operate ―flash.‬
‭-‬ ‭Operate shutter.‬
‭-‬ ‭Instructs storage of the image.‬
‭-‬ ‭Check on value of light intensity.‬
‭-‬ ‭Adjust focal length and focus image.‬
‭Outputs‬
‭-‬ ‭Video/pictures of cars captured‬
‭-‬ ‭Alarms of over-speeding cars‬

‭Microwave Cookers‬
‭ unction‬ ‭by‬ ‭switching‬ ‭a‬ ‭microwave‬ ‭unit‬ ‭on‬ ‭for‬ ‭a‬ ‭sufficient‬ ‭time‬ ‭to‬ ‭either‬ ‭defreeze‬
F
‭frozen‬‭food‬‭o r‬‭cook‬‭it.‬‭It‬‭is‬‭used‬‭to‬‭cook‬‭food‬‭quickly‬‭by‬‭using‬‭waves‬‭(similar‬‭to‬‭radio‬
‭waves) to heat the food.‬
‭Inputs‬‭:‬
‭Modern cookers have sensors attached to a microprocessor for detecting as inputs:‬
‭Weight of food‬
‭Temperature of food‬
‭Some cookers will also have additional sensors for detecting:‬
‭-‬ ‭Amount of steam produced during cooking‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭18‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ ‭Amount of alcohol produced‬
‭Processing‬‭:‬
‭-‬ ‭The‬‭microprocessor‬‭continually‬‭monitors‬‭sensor‬‭readings‬‭and‬‭by‬‭referring‬‭to‬
‭a programmed in-built database of food types.‬
‭-‬ ‭The microprocessor determines‬‭time‬‭needed to cook‬‭o r defreeze food.‬
‭-‬ ‭IF‬ ‭a‬ ‭temperature‬ ‭in‬ ‭the‬‭food‬‭indicates‬‭the‬‭food‬‭is‬‭cooked‬‭OR‬‭the‬‭time‬‭set‬‭o n‬
‭the oven clock is reached THEN microwaves are not produced‬
‭Output‬‭:‬ ‭Heat‬ ‭for‬ ‭cooking,‬ ‭Light‬ ‭indicating‬ ‭that‬ ‭food‬ ‭is‬ ‭cooked,‬ ‭power‬ ‭turned‬ ‭o ff‬‭if‬
‭food is cooked.‬

‭*NB:-Tasks performed‬‭by microprocessor‬‭inside some‬‭o f the devices include:‬


‭-‬ ‭In‬ ‭digital‬ ‭c amera‬‭:‬ ‭automatically‬ ‭adjust‬‭film‬‭speed,‬‭positions‬‭the‬‭end‬‭o f‬‭film,‬
‭adjust distance from object, adjusts light.‬
‭-‬ ‭In‬ ‭washing‬ ‭machine‬‭:‬ ‭Controls‬ ‭the‬ ‭amount‬ ‭o f‬ ‭water.‬ ‭Adjust‬ ‭and‬ ‭controls‬
‭speed‬ ‭o f‬ ‭wash.‬‭Control‬‭temperature‬‭o f‬‭water‬‭and‬‭the‬‭time‬‭taken‬‭to‬‭wash‬‭the‬
‭clothes.‬
‭-‬ ‭In‬ ‭fridges‬‭:‬ ‭Controls‬ ‭temperature‬ ‭level.‬ ‭Control‬ ‭the‬ ‭display‬ ‭panel.‬ ‭Switch‬ ‭o n‬
‭lights if door is opened and off when closed.‬
‭-‬ ‭In‬ ‭air‬ ‭conditioners‬‭:‬ ‭Controls‬ ‭temperature.‬ ‭Controls‬ ‭timing‬ ‭and‬ ‭the‬ ‭display‬
‭panel‬

‭Differences between Control and Automated systems‬


‭Control Systems‬ ‭Automated Systems‬
‭Can have several tasks‬ ‭Dedicated to one task‬
‭Can collect and analyse data‬ ‭lack the ability to collect and analyse data‬
‭Allows user intervention‬ ‭They‬ ‭do‬ ‭not‬ ‭allow‬ ‭for‬ ‭o r‬ ‭act‬ ‭o n‬ ‭user‬
‭intervention‬
‭Has an element of feedback‬ ‭Do not involve feedback‬

‭ eedback‬‭:‬ ‭The‬ ‭process‬ ‭in‬ ‭which‬ ‭o utput‬ ‭o f‬ ‭a‬ ‭system‬ ‭can‬ ‭affect‬ ‭its‬ ‭own‬‭o utput.‬‭It‬‭is‬
F
‭whereby‬‭part‬‭o f‬‭the‬‭o utput‬‭o f‬‭a‬‭system‬‭is‬‭returned‬‭to‬‭its‬‭input‬‭in‬‭o rder‬‭to‬‭regulate‬‭its‬
‭further output.‬

‭SIMULATION AND MODELLING‬


‭ odelling‬
M
‭A‬ ‭model‬ ‭is‬ ‭a‬ ‭representation‬ ‭o f‬ ‭a‬ ‭real-life‬ ‭process/object‬ ‭which‬ ‭consists‬ ‭o f‬ ‭a‬ ‭set‬‭o f‬
‭equations which describes the behavior the process or object.‬
‭Modeling‬‭is‬‭the‬‭creation‬‭o f‬‭a‬‭programmed‬‭simulation‬‭o f‬‭a‬‭situation/process‬‭in‬‭o rder‬
‭to predict future trends.‬
‭It‬ ‭involves‬ ‭the‬ ‭use‬ ‭o f‬ ‭mathematical‬ ‭formulas‬ ‭and‬ ‭calculations‬ ‭to‬ ‭predict‬ ‭what‬ ‭is‬
‭likely to happen based on data recorded.‬
‭In‬ ‭modeling,‬ ‭we‬ ‭use‬ ‭the‬ ‭computer‬ ‭to‬ ‭solve‬ ‭equations‬ ‭so‬ ‭that‬ ‭we‬ ‭can‬ ‭carry‬ ‭o ut‬
‭simulation.‬
‭An equation for part of an economic model could be:‬
‭Unemployment = people able to work – people working.‬
‭You‬‭can‬‭develop‬‭and‬‭evaluate‬‭your‬‭own‬‭models‬‭o r‬‭use‬‭the‬‭models‬‭that‬‭have‬‭already‬
‭been set up to simulate a real life situations‬

‭3-D Models can be built using CAD, e.g for planning stores.‬

‭Advantages of modeling‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭19‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ ‭ o equipment is damaged‬
N
‭-‬ ‭People are not put in any danger‬
‭-‬ ‭Expensive prototypes don't need to be built‬
‭-‬ ‭Time can be sped up or slowed down‬
‭-‬ ‭Models can be run and re-run over and over‬
‭-‬ ‭Modifications can easily be made and re-tested quickly‬

‭Disadvantages of Modeling‬
‭-‬ ‭The‬ ‭results‬ ‭depend‬ ‭o n‬‭how‬‭good‬‭the‬‭model‬‭is‬‭and‬‭how‬‭much‬‭data‬‭was‬‭used‬
‭to create it in the first place.‬
‭-‬ ‭Models and simulations can't ever completely re-create real-life situations.‬
‭-‬ ‭Not every possible situation may have been included in the model.‬
‭-‬ ‭The equipment and software are expensive to purchase.‬
‭-‬ ‭Staff need to be trained how to use the software and equipment. ‬

‭SIMULATION‬

S‭ imulation‬‭is‬‭the‬‭study‬‭o f‬‭the‬‭behaviour‬‭o f‬‭a‬‭system‬‭using‬‭models‬‭in‬‭o rder‬‭to‬‭predict‬


‭future‬‭real‬‭life‬‭events,‬‭like‬‭population‬‭growth,‬‭flight‬‭simulator,‬‭etc.‬‭It‬‭involves‬‭feeding‬
‭values into a model to see how the model behaves.‬

I‭ n‬ ‭simulation,‬ ‭past‬ ‭and‬ ‭present‬ ‭data,‬ ‭as‬ ‭well‬ ‭as‬ ‭models‬ ‭are‬ ‭analysed‬ ‭in‬ ‭o rder‬ ‭to‬
‭predict the future. Simulation is used in the following areas:‬
‭-‬ ‭Training (e.g. pilots, drivers, medical doctors, etc.)‬
‭-‬ ‭running/testing chemical plants and nuclear plants‬
‭-‬ ‭trying out equipment to be used under sea or in outer space‬
‭-‬ ‭crash testing cars‬
‭-‬ ‭financial‬ ‭simulations‬ ‭(e.g.‬ ‭stock‬ ‭market‬ ‭predictions‬ ‭based‬ ‭o n‬ ‭various‬
‭scenarios)‬
‭-‬ ‭population‬‭growth‬‭(i.e.‬‭predict‬‭how‬‭the‬‭world’s‬‭population‬‭will‬‭increase‬‭based‬
‭o n a number of different scenarios)‬
‭-‬ ‭queues (e.g. simulating queues at supermarket checkouts)‬
‭-‬ ‭weather forecasting‬

‭Advantages of simulation‬
‭-‬ ‭saves cost (rather than doing the real thing)‬
‭-‬ ‭safer (scenarios tried out on the simulation first before used in reality)‬
‭-‬ ‭possible to try out various scenarios in advance‬
‭-‬ ‭Some‬ ‭environments‬ ‭make‬ ‭simulations‬ ‭the‬ ‭o nly‬ ‭way‬ ‭to‬ ‭carry‬ ‭o ut‬ ‭a‬ ‭task‬
‭beforehand‬‭(e.g.‬‭o uter‬‭space,‬‭under‬‭sea,‬‭chemical‬‭processes,‬‭nuclear‬‭reactors,‬
‭etc.)‬
‭-‬ ‭faster‬ ‭(no‬ ‭need‬ ‭to‬ ‭build‬ ‭and‬ ‭test‬ ‭real‬ ‭system,‬ ‭so‬ ‭it‬ ‭is‬ ‭possible‬ ‭to‬ ‭get‬ ‭results‬
‭more quickly)‬

‭FLIGHT SIMULATOR‬
-‭ ‬ F‭ light simulators are used to train pilots how to fly aircraft.‬
‭-‬ ‭They‬ ‭can‬ ‭also‬ ‭be‬ ‭used‬ ‭to‬‭test‬‭new‬‭aircraft‬‭before‬‭they‬‭are‬‭actually‬‭flown‬‭for‬
‭the first time.‬
‭-‬ ‭Flight‬ ‭simulators‬ ‭are‬ ‭expensive‬ ‭to‬ ‭buy‬ ‭but‬ ‭are‬ ‭much‬ ‭cheaper‬ ‭than‬ ‭actual‬
‭aircraft.‬
‭A‬ ‭landing‬ ‭simulation‬ ‭with‬ ‭ice‬ ‭o n‬ ‭the‬ ‭runway,‬ ‭thick‬ ‭fog‬ ‭and‬ ‭o nly‬ ‭o ne‬ ‭o f‬ ‭the‬ ‭four‬
‭engines working would really test the pilot’s ability‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭20‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ light‬ ‭simulators‬ ‭enable‬ ‭pilots‬ ‭to‬ ‭experience‬ ‭turbulence,‬ ‭snowstorms,‬
F
‭thunderstorms, fog, etc, without leaving the ground.‬

‭SIMULATION AT ROAD JUNCTION‬


‭The following is a series of traffic lights at two busy junctions:‬

‭In this simulation it is necessary to consider‬


‭-‬ ‭In this simulation it is necessary to consider:‬
‭-‬ ‭how and what data is gathered‬
‭-‬ ‭how the simulation is done‬
‭-‬ ‭how the system would work in real life‬
‭-‬ ‭why simulations are done‬

‭ ow data is gathered‬
H
‭To‬‭make‬‭this‬‭as‬‭realistic‬‭as‬‭possible,‬‭data‬‭needs‬‭to‬‭be‬‭gathered‬‭over‬‭a‬‭long‬‭period‬‭o f‬
‭time.‬ ‭This‬ ‭can‬ ‭be‬ ‭done‬ ‭by‬ ‭sensors‬‭in/near‬‭the‬‭road,‬‭using‬‭cameras‬‭o r‬‭manual‬‭data‬
‭collection. Data gathered includes:‬
‭-‬ ‭number of vehicles passing in all directions at each junction‬
‭-‬ ‭number‬ ‭o f‬ ‭vehicles‬ ‭passing‬ ‭in‬ ‭all‬ ‭directions‬ ‭at‬ ‭each‬ ‭junction‬ ‭at‬ ‭a‬ ‭particular‬
‭time of the day‬
‭-‬ ‭Number of cars build up at a junction before lights change‬
‭-‬ ‭is it a week day or weekend or public holiday‬
‭-‬ ‭how long it takes to clear vehicles at a junction‬
‭-‬ ‭o ther data (e.g. pedestrian crossings)‬
‭-‬ ‭time taken for largest/slowest vehicle to pass through a junction‬
‭-‬ ‭o ther factors (e.g. filtering of traffic to the right or left)‬

‭ ow simulation is done‬
H
‭The‬ ‭data‬ ‭is‬ ‭entered‬ ‭into‬ ‭the‬ ‭computer‬ ‭and‬ ‭the‬ ‭simulation‬ ‭is‬ ‭run.‬ ‭The‬ ‭following‬
‭scenarios may be tried out:‬
‭-‬ ‭timing of lights is varied to see how the traffic flow is affected‬
‭-‬ ‭build‬‭up‬‭number‬‭o f‬‭vehicles‬‭stopped‬‭at‬‭a‬‭junction‬‭and‬‭change‬‭timing‬‭o f‬‭lights‬
‭to see how it affects the traffic flow‬
‭-‬ ‭increase/decrease traffic flow in all directions to see how the traffic is affected‬
‭-‬ ‭try out the impact of accidents‬
‭-‬ ‭consider passage of emergency vehicles‬
‭-‬ ‭effect of adding in pedestrian crossings‬
‭-‬ ‭o nce‬‭the‬‭simulation‬‭is‬‭run,‬‭the‬‭timing‬‭o f‬‭the‬‭lights‬‭is‬‭determined‬‭and‬‭how‬‭they‬
‭interact so that the maximum traffic flow is achieved;‬
‭-‬ ‭fault scenarios (e.g. an accident) and their impact are considered‬

‭How the system works in real time‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭21‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ S‭ ensors‬ ‭in/near‬ ‭the‬ ‭road‬ ‭gather‬ ‭data‬ ‭(these‬ ‭can‬ ‭be‬ ‭light/infra-red‬ ‭sensors,‬
‭induction loops, pressure sensors, etc.)‬
‭-‬ ‭the data is usually number of vehicles passing a particular point‬
‭-‬ ‭the data is sent to a control box or computer system‬
‭-‬ ‭the‬‭gathered‬‭data‬‭is‬‭compared‬‭to‬‭data‬‭stored‬‭in‬‭the‬‭system‬‭(the‬‭stored‬‭data‬‭is‬
‭based‬ ‭o n‬ ‭simulation‬ ‭runs,‬ ‭how‬ ‭the‬ ‭number‬ ‭o f‬ ‭vehicles‬ ‭at‬ ‭a‬ ‭junction‬ ‭at‬ ‭a‬
‭particular time of day affects the traffic flow, etc.)‬
‭-‬ ‭the‬ ‭control‬ ‭box‬ ‭o r‬ ‭computer‬ ‭“decides”‬ ‭what‬ ‭course‬ ‭o f‬ ‭action‬ ‭to‬ ‭take‬ ‭and‬
‭sends signals to the traffic lights to change timing if necessary‬
‭-‬ ‭as with any system involving sensors, ADC and DAC interfaces may be needed‬

‭SIMULATION IN WEATHER FORECASTING‬


‭Another example of simulation is predicting weather (i.e. a weather forecaster).‬

‭How and what data is collected‬


‭-‬ ‭Super computers are used since they control satellites in orbit.‬
‭-‬ ‭sensors measure the following variables in analogue form‬
‭o ‬ ‭pressure,‬
‭o ‬ ‭temperature,‬
‭o ‬ ‭relative humidity,‬
‭o ‬ ‭wind speed and‬
‭o ‬ ‭wind direction‬
‭-‬ ‭sensors are placed in weather balloons and/or weather stations‬
‭-‬ ‭information is also got from satellites‬
‭-‬ ‭pilots‬ ‭also‬ ‭send‬ ‭in‬ ‭information‬ ‭regarding‬ ‭weather‬ ‭conditions‬ ‭during‬ ‭long‬
‭flights‬
‭-‬ ‭The‬ ‭data‬ ‭collected‬ ‭by‬ ‭the‬‭data‬‭loggers‬‭will‬‭be‬‭in‬‭analogue‬‭form‬‭and‬‭the‬‭ADC‬
‭device converts this to discrete values (digital) for the computer to accept.‬

‭How the simulation is done‬


‭-‬ ‭Data‬ ‭and‬ ‭information‬ ‭from‬ ‭the‬ ‭sensors/satellites‬ ‭is‬ ‭sent‬ ‭to‬ ‭computer‬ ‭for‬
‭processing‬
‭-‬ ‭This‬ ‭data‬ ‭is‬ ‭compared‬ ‭to‬ ‭information‬ ‭stored‬ ‭o n‬ ‭files‬ ‭which‬ ‭contain‬ ‭known‬
‭weather patterns from the past‬
‭-‬ ‭predictions are made based on these comparisons‬
‭-‬ ‭Calculations‬ ‭are‬ ‭made‬ ‭to‬ ‭produce‬ ‭expected‬ ‭minimum‬ ‭and‬ ‭maximum‬
‭temperatures, pressure, moisture content, rainfall patterns, etc‬
‭-‬ ‭The computer produces weather maps showing isobars, temperatures, etc.‬
‭-‬ ‭computer‬ ‭can‬ ‭show‬ ‭graphically‬ ‭how‬ ‭weather‬ ‭(e.g.‬ ‭cloud‬ ‭formations)‬ ‭will‬
‭change‬‭with‬‭time‬‭(i.e.‬‭predict‬‭weather‬‭patterns)‬‭–‬‭this‬‭is‬‭o ften‬‭presented‬‭as‬‭a‬
‭computer‬ ‭generated‬ ‭video‬ ‭showing‬ ‭how‬ ‭clouds‬ ‭build‬ ‭up,‬ ‭how‬ ‭temperature‬
‭and pressure changes over, for example, the next 7 days, wind speeds etc.‬
‭-‬ ‭It‬ ‭is‬ ‭also‬ ‭possible‬ ‭to‬ ‭do‬ ‭statistical‬ ‭analysis‬ ‭and‬ ‭predict‬ ‭the‬ ‭percentage‬
‭probability that certain weather conditions will occur.‬

‭How future environment/climate changes can be predicted‬


‭-‬ ‭Weather‬ ‭forecasting‬ ‭uses‬ ‭the‬ ‭concept‬ ‭o f‬ ‭simulation‬ ‭and‬ ‭modelling‬ ‭i.e.‬
‭predicting the weather by studying a mathematical weather model.‬
‭-‬ ‭The‬ ‭measurements‬ ‭are‬ ‭then‬ ‭entered‬ ‭into‬ ‭a‬ ‭mathematical‬ ‭weather‬ ‭model‬
‭which then makes complex calculations to come up with the weather reports.‬
‭-‬ ‭based‬ ‭o n‬ ‭changes‬ ‭in‬ ‭weather‬‭patterns,‬‭the‬‭processor‬‭carries‬‭o ut‬‭a‬‭statistical‬
‭prediction‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭22‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ m‭ odel is able to change parameters to see how future climate can be affected‬
‭-‬ ‭there‬‭is‬‭need‬‭to‬‭review‬‭a‬‭lot‬‭o f‬‭previous‬‭data‬‭over‬‭a‬‭number‬‭o f‬‭years‬‭to‬‭check‬
‭if‬‭changes‬‭are‬‭genuine‬‭,‬‭for‬‭example‬‭20‬‭years,‬‭predictions‬‭compared‬‭to‬‭actual‬
‭climate conditions to validate/further refine the model‬
‭-‬ ‭can‬ ‭make‬ ‭use‬ ‭o f‬ ‭spread‬ ‭sheets‬ ‭and‬ ‭statistical‬ ‭software‬ ‭packages‬ ‭for‬ ‭o ther‬
‭calculations‬

‭Output‬‭:‬
‭-‬ ‭Information‬ ‭o btained‬ ‭is‬ ‭displayed‬ ‭o n‬ ‭the‬ ‭computer‬ ‭screen‬ ‭ready‬ ‭for‬
‭presentation on televisions‬
‭-‬ ‭Information can be printed documents.‬
‭-‬ ‭Tables and graphs are produced‬
‭-‬ ‭Rainfall maps and isobars are produced.‬
‭-‬ ‭Expected minimum and maximum temperatures are produced‬
‭-‬ ‭Areas‬‭o f‬‭pressure‬‭change‬‭with‬‭time‬‭so‬‭it‬‭is‬‭possible‬‭to‬‭predict‬‭rainfall,‬‭strong‬
‭winds, etc. in advance‬
‭-‬ ‭Show‬‭how‬‭the‬‭clouds‬‭patterns‬‭will‬‭change‬‭with‬‭time‬‭so‬‭it‬‭is‬‭possible‬‭to‬‭predict‬
‭rainfall‬

‭ dvantages of this automatic weather forecasting system include:‬


A
‭-‬ ‭Computer‬ ‭can‬ ‭take‬ ‭readings‬ ‭during‬ ‭weekends‬ ‭and‬ ‭public‬ ‭holidays‬ ‭without‬ ‭the‬
‭presence of human beings.‬
‭-‬ ‭Computer readings are more accurate.‬
‭-‬ ‭Readings can be taken more frequently.‬
‭-‬ ‭Readings can be taken any time of day or night.‬
‭-‬ ‭Graphs can be produced more easily.‬
‭-‬ ‭Readings can be taken more reliably.‬
‭-‬ ‭Humans can be more productive if not collecting data.‬

‭SIMULATING QUEUING IN A SUPERMARKET‬


‭Collecting data for the model:‬
‭-‬ ‭Sensors‬‭count‬‭number‬‭o f‬‭people‬‭at‬‭checkouts‬‭points‬‭at‬‭each‬‭time‬‭of‬‭day‬‭and‬
‭each‬‭day of the week‬
‭-‬ ‭count‬ ‭how‬ ‭many‬ ‭people‬ ‭build‬ ‭up‬‭at‬‭the‬‭checkouts‬‭o n‬‭either‬‭is‬‭it‬‭a‬‭weekday‬‭,‬
‭weekend‬‭o r‬‭bank holiday‬
‭-‬ ‭determine how long it take to serve a customer‬

‭Carrying out the simulation‬


‭-‬ ‭number of checkouts opened and see how flow of people affected‬
‭-‬ ‭Build‬‭up‬‭number‬‭o f‬‭customers‬‭at‬‭checkout,‬‭o pen‬‭extra‬‭checkouts‬‭and‬‭see‬‭how‬
‭it affects time to be served, etc.‬
‭-‬ ‭Increase/decrease number of customers and observe the affect‬
‭-‬ ‭Once‬ ‭simulation‬ ‭is‬ ‭run,‬ ‭number‬ ‭o f‬ ‭checkouts‬ ‭needed‬ ‭is‬ ‭determined‬ ‭and‬
‭interaction‬ ‭with‬ ‭customers‬ ‭is‬ ‭determined‬ ‭so‬ ‭that‬ ‭o ptimum‬ ‭throughput‬ ‭is‬
‭achieved‬
‭-‬ ‭Look at fault scenarios (breakdown of equipment etc.)‬

‭EMBEDDED WEB TECHNOLOGY (EWT)‬


‭-‬ T
‭ his‬‭is‬‭a‬‭new‬‭technology‬‭that‬‭uses‬‭the‬‭Internet‬‭in‬‭real‬‭time‬‭to‬‭control/interact‬‭with‬
‭a device which contains an embedded microprocessor.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭23‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ T ‭ he‬ ‭user‬ ‭needs‬ ‭to‬ ‭be‬ ‭authorised‬ ‭to‬ ‭do‬ ‭this‬ ‭and‬ ‭can‬ ‭control‬ ‭a‬ ‭device‬ ‭anywhere‬
‭using‬ ‭a‬ ‭web‬ ‭browser‬ ‭(e.g.‬ ‭from‬ ‭a‬ ‭computer‬ ‭o r‬ ‭even‬ ‭a‬ ‭mobile‬ ‭phone‬ ‭which‬ ‭is‬
‭web-enabled).‬
‭-‬ ‭Example:‬ ‭An‬ ‭oven‬ ‭contains‬ ‭an‬ ‭embedded‬ ‭processor.‬ ‭The‬ ‭owner‬ ‭can‬ ‭use‬ ‭a‬ ‭web‬
‭ready mobile phone anywhere to control the oven remotely.‬
‭-‬ ‭By accessing a web site one is able to send instructions to control the oven.‬
‭-‬ ‭It‬ ‭is‬ ‭possible‬ ‭to‬ ‭control‬ ‭any‬ ‭device‬ ‭in‬ ‭this‬ ‭way‬ ‭if‬ ‭it‬ ‭contains‬ ‭an‬ ‭embedded‬
‭processor‬ ‭e.g.‬ ‭television,‬ ‭DVD‬ ‭player/recorder,‬ ‭washing‬ ‭machine,‬ ‭scientific‬
‭experiments in remote areas such as outer space‬

‭GLOBAL POSITIONING SATELLITES (GPS)‬


‭ PS‬‭-‬‭A‬‭navigational‬‭system‬‭involving‬‭satellites‬‭and‬‭computers‬‭that‬‭can‬‭determine‬‭the‬
G
‭latitude‬ ‭and‬ ‭longitude‬ ‭(position)‬ ‭o f‬ ‭a‬ ‭receiver‬ ‭o n‬ ‭earth‬ ‭by‬ ‭computing‬ ‭the‬ ‭time‬
‭difference for signals from different satellites to reach the receiver.‬

‭-‬ G ‭ PS‬ ‭systems‬ ‭are‬ ‭used‬ ‭to‬ ‭determine‬ ‭the‬ ‭exact‬ ‭location‬ ‭o f‬ ‭a‬ ‭car,‬ ‭airplane,‬ ‭ship‬‭o r‬
‭any form of transport which travels from one place to another.‬
‭-‬ ‭In vehicles these systems are called Satellite Navigation Systems (sat nav).‬
‭-‬ ‭Satellites in outer space transmit signals to the Earth.‬
‭-‬ ‭Computers‬ ‭in‬ ‭vehicles‬ ‭(e.g.‬ ‭car,‬ ‭airplane‬ ‭o r‬ ‭ship)‬ ‭receive‬ ‭and‬ ‭interpret‬ ‭these‬
‭signals.‬
‭-‬ ‭Positioning‬ ‭depends‬‭o n‬‭very‬‭accurate‬‭timing‬‭–‬‭atomic‬‭clocks‬‭are‬‭used‬‭because‬‭o f‬
‭their accuracy to within a fraction of a second per day.‬
‭-‬ ‭Each satellite transmits data indicating its position and time.‬
‭-‬ ‭The‬‭computer‬‭in‬‭the‬‭vehicle‬‭calculates‬‭its‬‭location‬‭based‬‭o n‬‭the‬‭information‬‭from‬
‭at least three satellites as shown below:‬

-‭ ‬ I‭ n motor vehicles the system is called satellite navigation (sat nav).‬


‭-‬ ‭The on board computer contains pre-stored road maps.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭24‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ T
‭ he‬ ‭vehicle’s‬ ‭exact‬ ‭location,‬ ‭based‬ ‭o n‬ ‭satellite‬ ‭positioning,‬ ‭can‬ ‭be‬ ‭shown‬ ‭o n‬ ‭the‬
‭map;‬ ‭the‬ ‭driver‬ ‭can‬ ‭then‬ ‭be‬ ‭given‬ ‭verbal‬ ‭directions‬ ‭e.g‬‭.‬ ‭“turn‬ ‭left‬ ‭into‬ ‭Josiah‬
‭Tongogara Road”‬‭OR‬‭a screen output showing the vehicle‬‭moving on the map‬

‭How satellite navigation systems can be used to calculate a vehicle’s position‬


‭-‬ ‭satellites in outer space transmit signals to the Earth‬
‭-‬ ‭computers in the bus receive and interpret these signals‬
‭-‬ ‭the satellite relies on very accurate timing (atomic clocks)‬
‭-‬ ‭each satellite transmits data indicating position and time‬
‭-‬ ‭computer in bus calculates its position based on received satellite data‬
‭-‬ ‭at least three satellites are used to give the vehicle’s exact position‬

‭How the drivers uses the satellite navigation system:‬


‭-‬ ‭the computer has a number of pre-stored maps‬
‭-‬ ‭bus location shown on appropriate map‬
‭-‬ ‭directions are given verbally or on-screen output (on a map)‬

‭ dvantages‬
A
‭-‬ ‭It‬ ‭is‬ ‭far‬ ‭safer‬ ‭since‬ ‭a‬ ‭driver‬ ‭o f‬ ‭a‬ ‭vehicle‬ ‭doesn’t‬ ‭have‬ ‭to‬ ‭consult‬ ‭maps‬ ‭whilst‬
‭driving.‬
‭-‬ ‭it also removes error (e.g. going the wrong way down a one-way street).‬
‭-‬ ‭Sat‬ ‭nav‬ ‭systems‬ ‭can‬ ‭also‬ ‭give‬ ‭additional‬ ‭information‬ ‭such‬ ‭as‬ ‭position‬ ‭o f‬ ‭speed‬
‭cameras, estimate time of arrival, etc.‬
‭-‬ ‭GPS‬ ‭can‬ ‭monitor‬ ‭a‬ ‭vehicle’s‬ ‭position‬ ‭if‬ ‭it‬ ‭has‬ ‭broken‬ ‭down‬ ‭o r‬ ‭has‬ ‭been‬ ‭stolen‬
‭(vehicle tracking system).‬
‭-‬ ‭In‬ ‭airplanes‬ ‭GPS‬ ‭can‬ ‭pinpoint‬ ‭its‬ ‭exact‬ ‭location‬ ‭in‬ ‭case‬ ‭o f‬ ‭an‬ ‭accident‬ ‭which‬
‭enables search teams to quickly respond to the incident.‬

‭ isadvantages‬
D
‭-‬ ‭maps‬‭may‬‭not‬‭up‬‭to‬‭date‬‭therefore‬‭instructed‬‭to‬‭turn‬‭into‬‭a‬‭road‬‭which‬‭no‬‭longer‬
‭exists‬
‭-‬ ‭road‬ ‭closures‬ ‭due‬ ‭to‬ ‭accidents‬ ‭o r‬ ‭road‬ ‭works‬ ‭may‬ ‭cause‬ ‭problems‬ ‭to‬ ‭a‬ ‭sat‬‭nav‬
‭system‬
‭-‬ ‭signal loss can cause problems with GPS systems‬
‭-‬ ‭potential interferences from external sources (major problem on aircraft)‬
‭-‬ ‭incorrect start and end point entered into system can cause problems‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭25‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭THE INTERNET‬
I‭ nternet‬ ‭stands‬ ‭for‬ ‭INTERnational‬ ‭NETwork‬ ‭and‬ ‭it‬ ‭is‬ ‭a‬ ‭global‬ ‭(world-wide)‬
‭connection‬ ‭o f‬ ‭computer‬ ‭networks‬ ‭for‬ ‭information‬ ‭sharing.‬ ‭On‬ ‭the‬ ‭internet,‬ ‭o ne‬ ‭is‬
‭able‬ ‭to‬ ‭access‬ ‭data‬ ‭stored‬ ‭o n‬ ‭a‬ ‭server‬ ‭in‬ ‭any‬ ‭part‬ ‭o f‬ ‭the‬ ‭world‬ ‭as‬ ‭long‬ ‭as‬ ‭it‬ ‭is‬
‭connected‬ ‭to‬ ‭the‬ ‭internet‬ ‭itself.‬ ‭The‬ ‭internet‬ ‭can‬ ‭be‬ ‭accessed‬ ‭from‬ ‭anywhere.‬ ‭It‬ ‭is‬
‭also‬ ‭available‬ ‭to‬ ‭anyone.‬ ‭No‬ ‭o ne‬ ‭controls‬ ‭the‬ ‭internet‬ ‭as‬ ‭computers‬ ‭in‬ ‭different‬
‭countries‬‭are‬‭connected‬‭yet‬‭the‬‭countries‬‭have‬‭different‬‭laws.‬‭However,‬‭each‬‭country‬
‭may regulate internet usage in its own territory.‬

‭ efinition of Terms‬
D
‭Information‬‭Superhighway‬‭(ISH):‬‭A‬‭global‬‭network‬‭o f‬‭computers‬‭for‬‭moving‬‭huge‬
‭amounts‬‭o f‬‭information‬‭via‬‭satellite‬‭and‬‭cable‬‭connection.‬‭Information‬‭found‬‭o n‬‭ISH‬
‭includes‬ ‭home‬‭shopping,‬‭entertainment,‬‭news,‬‭software‬‭downloads‬‭and‬‭help,‬‭o nline‬
‭banking, stock market dealing, jobs, (vacancies), university placements, etc.‬
‭Information‬ ‭Technology‬‭(IT):‬‭-‬‭The‬‭use‬‭o f‬‭computers‬‭in‬‭information‬‭handling‬‭and‬
‭communication.‬
‭Information‬ ‭Age:‬ ‭A‬ ‭period‬ ‭beginning‬ ‭in‬ ‭the‬ ‭last‬ ‭quarter‬‭o f‬‭the‬‭20th‬‭century‬‭when‬
‭information‬ ‭became‬ ‭easily‬ ‭accessible‬ ‭through‬ ‭publications‬ ‭and‬ ‭through‬ ‭the‬
‭manipulation of information by computers and computer networks.‬
‭Global‬ ‭Village‬‭:‬ ‭the‬ ‭use‬ ‭o f‬ ‭the‬ ‭internet‬ ‭to‬ ‭access‬ ‭information‬ ‭from‬ ‭any‬ ‭part‬ ‭o f‬ ‭the‬
‭world.‬
‭Information‬ ‭and‬ ‭Communication‬ ‭Technology‬ ‭(ICT):‬ ‭The‬ ‭use‬ ‭o f‬ ‭computers‬ ‭and‬
‭related‬ ‭method‬ ‭as‬ ‭a‬ ‭tool‬ ‭for‬ ‭information‬ ‭communication,‬ ‭for‬ ‭instance‬ ‭through‬
‭e-mails, cell phones, etc.‬
‭Web‬ ‭page‬‭:‬ ‭an‬ ‭HTML‬ ‭document‬ ‭o r‬ ‭page‬ ‭o n‬ ‭the‬ ‭internet‬ ‭that‬ ‭contains‬ ‭information‬
‭about an organisation.‬
‭Website‬‭:-a‬‭collection‬‭o f‬‭HTML‬‭documents‬‭at‬‭the‬‭same‬‭domain,‬‭o ften‬‭with‬‭a‬‭common‬
‭name‬‭and‬‭maintained‬‭and‬‭provide‬‭information‬‭o f‬‭a‬‭single‬‭o rganisation‬‭and‬‭is‬‭found‬
‭o n‬ ‭the‬ ‭internet.‬‭It‬‭is‬‭an‬‭HTML‬‭page/pages‬‭o n‬‭the‬‭internet‬‭that‬‭contains‬‭information‬
‭about an organisation‬
‭Hyperlink‬ ‭:-‬ ‭an‬ ‭area‬ ‭o f‬ ‭a‬ ‭web‬ ‭page,‬ ‭usually‬ ‭text‬ ‭o r‬ ‭image,‬ ‭that‬ ‭contains‬ ‭a‬ ‭links‬ ‭to‬
‭another‬ ‭web‬ ‭page.‬ ‭It‬ ‭is‬ ‭usually‬ ‭underlined‬ ‭o r‬ ‭has‬‭a‬‭different‬‭colour‬‭to‬‭show‬‭that‬‭it‬
‭can link the user to another site.‬
‭Home‬ ‭page‬‭:‬ ‭A‬ ‭web‬ ‭page‬ ‭that‬ ‭loads‬ ‭first‬ ‭(by‬ ‭default)‬ ‭when‬ ‭o ne‬ ‭logs‬ ‭o n‬ ‭to‬ ‭the‬
‭internet.‬‭It‬‭then‬‭provides‬‭links‬‭to‬‭o ther‬‭sites‬‭o n‬‭the‬‭internet.‬‭It‬‭is‬‭also‬‭a‬‭web‬‭page‬‭that‬
‭appears first when you log on to a website.‬
‭ RL:‬ ‭Uniform‬ ‭Resource‬ ‭Locator:‬ ‭This‬ ‭is‬ ‭a‬ ‭unique‬ ‭address‬ ‭that‬ ‭identifies‬ ‭a‬
U
‭website/page‬ ‭o n‬ ‭the‬ ‭internet,‬ ‭e.g.‬ ‭http://www.econet.co.zw‬‭.‬ ‭This‬ ‭o nly‬ ‭identifies‬ ‭o ne‬
‭(unique)‬‭web‬‭page‬‭for‬‭Econet‬‭Wireless‬‭which‬‭is‬‭found‬‭in‬‭Zimbabwe‬‭(.zw).‬‭Thus‬‭a‬‭URL‬
‭is a unique address for each web page. A typical URL looks like:‬

‭http://www.google.co.zw/computing/student.html‬‭.‬

‭This address has some a number of parts:‬


‭-‬ ‭http:// - protocol‬
‭-‬ ‭www. - host computer‬
‭-‬ ‭google.co.zw – Domain name and country‬
‭-‬ ‭computing – folder‬
‭-‬ ‭student. – Document name‬
‭-‬ ‭.html – document type (HTML type of document in this case)‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭26‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ "‭ http"‬ ‭(HyperText‬ ‭Transfer‬ ‭Protocol)‬ ‭and‬ ‭a‬ ‭domain‬ ‭name‬ ‭(such‬ ‭as‬ ‭."co.uk").‬
‭Other domain names are as follows:‬

‭-‬ ‭.zw‬ ‭Zimbabwe‬

‭-‬ ‭.za‬ ‭South Africa‬

‭-‬ ‭.zm‬ ‭Zambia‬

‭-‬ ‭.bw‬ ‭Botswana, etc‬

‭ ardware Requirements for an Internet Connection‬


H
‭-‬ ‭Modem‬ ‭(MOdulator‬ ‭DEModulator):-‬ ‭a‬ ‭device‬ ‭that‬ ‭converts‬ ‭analogue‬ ‭data‬ ‭to‬
‭digital‬ ‭form‬ ‭and‬ ‭vice‬ ‭versa,‬ ‭o ften‬ ‭for‬ ‭internet‬ ‭connection‬ ‭using‬ ‭a‬‭telephone‬‭line.‬
‭Alternatively one may acquire a GPRS (general packet radio service) modem.‬
‭-‬ ‭Communication‬ ‭link‬‭:‬ ‭Acts‬ ‭as‬ ‭a‬ ‭transmission‬ ‭media‬ ‭for‬‭data,‬‭e.g.‬‭telephone‬‭line,‬
‭satellite transmission, etc.‬
‭-‬ ‭Network‬ ‭c ards‬ ‭for‬ ‭each‬ ‭computer:-‬ ‭a‬ ‭device‬ ‭that‬ ‭identifies‬ ‭computers‬ ‭to‬ ‭the‬
‭network, has an interface where network cables are plugged on the computer‬

‭ oftware Requirements for an Internet Connection‬


S
‭These are: Communication Software, web browser and Network operating system‬
‭(a)‬‭Communication‬‭Software‬‭like‬‭TCP/IP‬‭–‬‭Transmission‬‭Control‬‭Protocol‬‭Internet‬
‭Protocol.‬ ‭Allows‬ ‭devices‬ ‭to‬ ‭connect‬ ‭to‬ ‭the‬ ‭internet‬ ‭even‬ ‭if‬ ‭they‬ ‭have‬ ‭different‬
‭manufacturer standards by use of pre-set rules or international standards.‬
‭(b)‬‭Web‬‭Browser:‬‭refers‬‭to‬‭software‬‭used‬‭for‬‭o pening‬‭web‬‭pages‬‭o n‬‭the‬‭internet,‬‭for‬
‭example Microsoft Internet Explorer, Netscape Navigator, Mozilla Firefox, Opera, etc.‬
‭-‬ ‭Web browsers are‬‭used view web pages from the World‬‭Wide Web (www).‬
‭-‬ ‭A‬‭web‬‭page‬‭is‬‭a‬‭site‬‭(HTML‬‭document)‬‭o n‬‭the‬‭internet‬‭that‬‭provides‬‭information‬
‭about an organisation.‬
‭-‬ ‭The‬ ‭World‬ ‭Wide‬‭Web‬‭(www)‬‭is‬‭a‬‭vast‬‭repository‬‭o f‬‭data‬‭stored‬‭o n‬‭websites‬‭o n‬
‭the internet.‬
‭-‬ ‭Web pages can be created using any of the following software:‬
‭●‬ ‭HTML (editor),‬
‭●‬ ‭word processing package,‬
‭●‬ ‭desktop publishing software,‬
‭●‬ ‭web publishing software,‬
‭●‬ ‭Presentation software.‬

‭Web Developing Software Features‬‭:‬


‭-‬ ‭Feature for changing the background colour or background image on a page.‬
‭-‬ ‭Feature‬ ‭for‬ ‭formatting‬ ‭text‬ ‭(size,‬ ‭font,‬ ‭colour,‬ ‭bold,‬ ‭italic,‬ ‭underline‬ ‭etc.)‬ ‭o r‬
‭frames.‬
‭-‬ ‭Able to work with tables.‬
‭-‬ ‭Features for inserting graphics/pictures/sound clip/video clip/animations.‬
‭-‬ ‭Features for working with links/creating buttons/list box.‬
‭-‬ ‭Features for switching to a browser to check the appearance of a page.‬
‭-‬ ‭Use templates.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭27‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ebsite features‬
W
‭The following are the general features of a good website‬
‭-‬ ‭shopping basket‬
‭-‬ ‭o ffer security when using credit/debit cards‬
‭-‬ ‭search facility for artist, tile, item, etc‬
‭-‬ ‭drop down boxes to choose categories‬
‭-‬ ‭help facilities‬
‭-‬ ‭currency converters for international customers‬
‭-‬ ‭date/sales confirmation by automatic email‬
‭-‬ ‭saved customer details/customised pages‬
‭-‬ ‭ability to track status of orders‬
‭-‬ ‭ability to listen to/view/see video/see product, etc‬
‭-‬ ‭recognise customer as soon as they log on‬
‭-‬ ‭buttons to navigate to other web pages‬

‭ hen‬‭designing‬‭web‬‭pages‬‭it‬‭is‬‭necessary‬‭to‬‭supply‬‭the‬‭correct‬‭spacing‬‭for‬‭customer‬
W
‭information‬‭(and/or‬‭use‬‭drop‬‭down‬‭menus),‬‭buttons‬‭to‬‭navigate‬‭to‬‭o ther‬‭web‬‭pages,‬
‭etc‬

(‭ c)‬‭Network‬‭operating‬‭system‬‭:‬‭manages‬‭the‬‭network‬‭and‬‭o ffers‬‭security‬‭to‬‭internet‬
‭users.‬

‭ B‬‭:‬ ‭internet‬ ‭account‬‭:‬ ‭a‬ ‭unique‬ ‭personal‬ ‭identifier‬ ‭given‬ ‭by‬ ‭the‬ ‭Internet‬ ‭Service‬
N
‭Provider‬‭(ISP).‬‭An‬‭ISP‬‭is‬‭an‬‭o rganisation‬‭that‬‭links‬‭users‬‭to‬‭the‬‭internet,‬‭for‬‭example,‬
‭Mweb, Ecoweb, Africaonline, Yahoo, Google Inc, etc.‬

‭Advantages of the Internet as a Source of Information‬


‭-‬ ‭Can be accessed from anywhere in the world.‬
‭-‬ ‭Information on the internet is up-to-date.‬
‭-‬ ‭Multimedia can be used.‬
‭-‬ ‭Huge‬‭amounts‬‭o f‬‭information‬‭can‬‭be‬‭accessed;‬‭e.g.,‬‭magazines,‬‭encyclopaedia,‬
‭dictionaries, newspapers, textbooks, etc.‬
‭-‬ ‭Search engines are available to assist in finding information.‬
‭-‬ ‭Using‬ ‭emails‬ ‭you‬ ‭can‬ ‭access‬ ‭experts‬ ‭from‬ ‭all‬ ‭over‬ ‭the‬ ‭world‬ ‭o n‬ ‭certain‬
‭subjects.‬

‭Disadvantages of the Internet as a Source of Information‬


‭-‬ ‭Equipment‬ ‭and‬‭connections‬‭needed‬‭are‬‭very‬‭expensive‬‭(computers,‬‭modems‬
‭(ISDN adapters) ISP, telephone).‬
‭-‬ ‭One needs knowledge to perform searches effectively.‬
‭-‬ ‭Problem of hackers.‬
‭-‬ ‭Breaches of copyrights are very common.‬
‭-‬ ‭Rampant spread of rumours on the internet.‬
‭-‬ ‭Spread of pornography to young people.‬
‭-‬ ‭Leads to loss of privacy.‬
‭-‬ ‭Some‬ ‭people‬ ‭become‬ ‭internet‬ ‭addicted‬ ‭and‬ ‭tend‬ ‭to‬ ‭interact‬ ‭with‬ ‭computers‬
‭more than with human beings.‬
‭-‬ ‭Credit card fraud is rampant.‬
‭-‬ ‭Cultural erosion and replacement of local culture by a global culture‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭28‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Searching information from the internet‬
‭-‬ ‭Search‬ ‭Engines‬‭:‬ ‭These‬ ‭are‬ ‭programs‬ ‭used‬ ‭to‬ ‭search‬ ‭data,‬ ‭information‬ ‭and‬
‭o ther‬ ‭websites‬ ‭from‬‭the‬‭internet,‬‭e.g.‬‭Google,‬‭Yahoo,‬‭etc.‬‭however,‬‭it‬‭requires‬
‭good‬ ‭skill‬ ‭from‬ ‭the‬ ‭user‬ ‭to‬ ‭efficiently‬ ‭use‬ ‭search‬ ‭engines‬ ‭in‬ ‭searching‬ ‭data‬
‭from the internet.‬
‭-‬ ‭Hits‬‭:‬ ‭these‬ ‭are‬ ‭many‬ ‭irrelevant‬ ‭(unwanted)‬ ‭results‬ ‭that‬ ‭can‬‭be‬‭displayed‬‭by‬
‭the search engine if the search engine is not used efficiently.‬
‭-‬ ‭To‬‭avoid‬‭hits‬‭when‬‭a‬‭search‬‭condition‬‭is‬‭entered,‬‭inclusion‬‭o f‬‭statements‬‭such‬
‭as AND (+) and OR will help narrow down the search. E.g.‬‭ZIMSEC+syllabus.‬

‭Internet and Security‬


S‭ ecurity‬ ‭is‬ ‭concerned‬ ‭with‬ ‭protection‬ ‭o f‬ ‭data‬ ‭from‬ ‭unauthorised‬ ‭access‬ ‭and‬ ‭from‬
‭deliberate or accidental loss.‬
‭Below‬‭are‬‭some‬‭o f‬‭the‬‭security‬‭concerns‬‭and‬‭some‬‭suggestions‬‭o n‬‭how‬‭they‬‭can‬‭be‬
‭rectified / prevented.‬

‭ ecurity‬
S ‭Solutions / safeguards‬
‭Problem‬
‭Hacking‬ -‭ ‬ ‭Use of passwords and (usernames) ids to prevent illegal access to files.‬
‭-‬ ‭Locking the computer itself or locking the computer room.‬
‭-‬ ‭Encryption‬ ‭stops‬ ‭the‬ ‭information‬ ‭from‬ ‭being‬ ‭read‬ ‭even‬ ‭if‬ ‭access‬ ‭has‬
‭been gained to a file but won’t stop hacking!!‬
‭-‬ ‭Installing firewalls‬
‭Viruses‬ ‭-‬ ‭Use ant-virus software like AVG, Avast, Esat NOD32, etc,‬
‭-‬ ‭Use firewalls to prevent viruses from entering a computer.‬
‭-‬ ‭Do not open emails/attachments from “unknown” sources;‬
‭-‬ ‭Only load software from disks/CDs which are originals‬
‭Corruption/Loss of Data due to the following ways‬‭:‬
‭- viruses‬ ‭Prevention of viruses is as given above‬
‭- hackers‬ ‭-‬ ‭Prevention of hackers is as given above‬

-‭ accidental‬ ‭-‬ A ‭ ccidental‬ ‭damage‬ ‭to‬‭data‬‭can‬‭be‬‭prevented‬‭by:‬‭keeping‬‭back-up‬


‭damage to data‬ ‭files or use the Grandfather-Father-Son (GFS) method;‬
‭-‬ ‭use‬‭o f‬‭passwords‬‭and‬‭ids‬‭can‬‭also‬‭help‬‭by‬‭restricting‬‭access‬‭in‬‭the‬
‭first place‬
‭-‬ ‭protection‬ ‭against‬ ‭hardware‬ ‭faults‬ ‭could‬ ‭be‬ ‭through‬ ‭keeping‬
‭- hardware faults‬ ‭back-ups or use Grandfather-Father-Son;‬
‭-‬ ‭use of UPS (Uninterruptible Power Supply), in case of power loss‬
‭-‬ ‭Running parallel systems also help‬
-‭ software faults‬ ‭-‬ ‭Software faults can be solved by keeping back-up files or‬
‭- incorrect‬ ‭-‬ ‭Can also be solved by using Grandfather-Father-Son would help‬
‭computer‬ ‭-‬ ‭Incorrect‬ ‭computer‬ ‭o peration‬ ‭can‬ ‭be‬ ‭solved‬ ‭by:‬ ‭backing‬‭up‬‭files‬
‭o peration‬ ‭would‬‭guard‬‭against‬‭problems‬‭caused‬‭by‬‭incorrect‬‭shutting‬‭down‬
‭o f the system‬

‭ efinition of terms (from the table above)‬


D
‭Hacking‬‭:‬ ‭Obtaining‬‭unauthorised‬‭access‬‭to‬‭protected‬‭and‬‭secure‬‭computer‬‭systems‬
‭o r network, usually using intelligent methods like cracking the password.‬
‭Hacker‬‭:‬‭A‬‭person‬‭who‬‭gains‬‭unauthorised‬‭access‬‭to‬‭protected‬‭and‬‭secure‬‭computer‬
‭systems or network, usually using intelligent methods like cracking the password‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭29‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ irus‬‭:‬ ‭A‬ ‭computer‬ ‭virus‬ ‭is‬ ‭a‬ ‭program‬ ‭which‬ ‭replicates‬ ‭itself,‬ ‭damages‬ ‭o r‬ ‭corrupts‬
V
‭files‬ ‭and‬ ‭memory‬ ‭o f‬ ‭the‬ ‭computer,‬ ‭for‬ ‭example,‬ ‭the‬ ‭Love‬‭Bug‬‭virus‬‭which‬‭attacked‬
‭computers in 2000.‬
‭Anti-Virus‬‭:‬ ‭These‬ ‭are‬ ‭programs‬ ‭that‬ ‭detect‬ ‭and‬ ‭remove‬ ‭(clean)‬ ‭computer‬ ‭viruses‬
‭and‬ ‭reduce‬ ‭the‬ ‭risk‬ ‭o f‬ ‭computers‬ ‭being‬ ‭attacked‬ ‭by‬ ‭viruses,‬ ‭e.g.‬ ‭Norton‬ ‭Antivirus,‬
‭MacAfee, Avira, Avast, AVG, etc.‬
‭Encryption‬‭:‬ ‭data‬ ‭encryption‬ ‭is‬ ‭the‬ ‭scrambling‬ ‭o f‬ ‭data‬ ‭before‬ ‭sending,‬ ‭for‬‭security‬
‭reasons,‬ ‭so‬ ‭that‬ ‭it‬ ‭is‬ ‭not‬ ‭readable‬ ‭unless‬ ‭it‬ ‭is‬ ‭decrypted‬ ‭using.‬ ‭However,‬ ‭some‬
‭government‬ ‭do‬ ‭not‬ ‭allow‬ ‭encryption‬ ‭in‬ ‭their‬‭countries‬‭for‬‭security‬‭reasons‬‭against‬
‭terrorism.‬
‭Back-up‬ ‭file‬‭:‬ ‭A‬ ‭duplicate‬ ‭(copy)‬ ‭o f‬ ‭the‬ ‭o riginal‬ ‭file‬ ‭that‬ ‭is‬ ‭created‬ ‭and‬ ‭stored‬ ‭at‬
‭different location with the original file, for security reason.‬
‭Grandfather-Father-Son‬ ‭files‬‭:‬‭Also‬‭called‬‭file‬‭generations:‬‭these‬‭are‬‭three‬‭versions‬
‭o f‬‭files‬‭that‬‭are‬‭kept‬‭at‬‭an‬‭o rganisation‬‭and‬‭are‬‭created‬‭as‬‭a‬‭result‬‭o f‬‭sequential‬‭file‬
‭updating and are used for data recovery when the current master file is lost.‬
‭UPS‬‭:‬ ‭Uninterruptible‬ ‭Power‬ ‭Supply‬ ‭(A‬ ‭device‬ ‭with‬ ‭rechargeable‬ ‭batteries‬ ‭that‬
‭provide‬ ‭continuous‬ ‭supply‬ ‭o f‬ ‭electricity‬ ‭to‬ ‭computers‬ ‭for‬ ‭a‬ ‭given‬ ‭period‬ ‭o f‬ ‭time‬ ‭if‬
‭there is power cut.‬
‭Parallel‬‭systems‬‭:‬‭Refers‬‭to‬‭the‬‭running‬‭o f‬‭two‬‭different‬‭systems‬‭but‬‭doing‬‭the‬‭same‬
‭job in the same organisation. Each system will have its own files.‬
‭Password‬‭:‬‭A‬‭password‬‭is‬‭a‬‭secret‬‭group‬‭o f‬‭alphanumeric‬‭characters‬‭used‬‭to‬‭protect‬
‭a document or file from unauthorised access‬
‭PIN‬‭:‬ ‭Personal‬ ‭Identification‬ ‭Number-‬ ‭a‬ ‭secret‬ ‭number‬ ‭used‬ ‭by‬ ‭individual‬ ‭account‬
‭holders‬ ‭to‬ ‭access‬ ‭bank‬ ‭account‬ ‭and‬ ‭get‬ ‭service‬ ‭at‬ ‭the‬ ‭ATM,‬ ‭phone,‬ ‭Point‬ ‭o f‬ ‭Sale‬
‭terminal (POS) using debit cards, etc.‬
‭Firewall‬‭:‬ ‭Hardware‬ ‭and‬ ‭associated‬ ‭software‬ ‭used‬ ‭to‬ ‭protect‬ ‭networked‬ ‭private‬
‭computer‬‭systems‬‭from‬‭unauthorised‬‭access‬‭by‬‭preventing‬‭o utside‬‭data/users‬‭from‬
‭entering‬‭the‬‭system‬‭while‬‭at‬‭the‬‭same‬‭time‬‭preventing‬‭internal‬‭data‬‭from‬‭leaving‬‭the‬
‭system.‬

‭Other internet threats include:‬


‭-‬ ‭Phishing‬ ‭is‬ ‭a‬ ‭way‬ ‭o f‬ ‭fooling‬ ‭someone‬ ‭into‬‭handing‬‭over‬‭the‬‭security‬‭details‬
‭for‬ ‭their‬ ‭bank‬ ‭account.‬ ‭The‬ ‭phisher‬ ‭sends‬ ‭an‬ ‭email‬ ‭that‬ ‭looks‬ ‭as‬‭if‬‭it‬‭comes‬
‭from‬ ‭the‬ ‭recipient’s‬ ‭bank‬ ‭and‬ ‭contains‬ ‭a‬ ‭link‬ ‭to‬ ‭a‬ ‭website‬ ‭controlled‬ ‭by‬‭the‬
‭phisher.‬ ‭It‬ ‭can‬ ‭be‬ ‭prevented‬ ‭by‬ ‭not‬ ‭clicking‬ ‭o n‬ ‭the‬ ‭link‬‭and‬‭instead‬‭going‬‭to‬
‭the bank’s website directly.‬
‭-‬ ‭Spam‬ ‭is‬ ‭unwanted‬ ‭email,‬ ‭o ften‬ ‭advertising‬ ‭products‬ ‭o r‬ ‭services.‬ ‭It‬ ‭can‬ ‭be‬
‭prevented‬‭by‬‭using‬‭an‬‭anti-spam‬‭filter,‬‭which‬‭is‬‭o ft‬‭en‬‭provided‬‭automatically‬
‭by an ISP.‬
‭-‬ ‭Pharming‬ ‭is‬ ‭an‬ ‭attack‬ ‭by‬ ‭hacking.‬ ‭It‬ ‭intercepts‬ ‭a‬ ‭browser‬ ‭request‬ ‭and‬
‭redirects‬ ‭it‬ ‭to‬ ‭another‬ ‭website‬ ‭o n‬ ‭which‬ ‭the‬ ‭attacker‬ ‭attempts‬ ‭to‬ ‭steal‬
‭authentication‬ ‭credentials‬ ‭o r‬ ‭debit‬ ‭o r‬ ‭credit‬ ‭card‬ ‭details,‬ ‭as‬ ‭in‬ ‭a‬ ‭phishing‬
‭attack.‬‭It‬‭can‬‭be‬‭discouraged‬‭by‬‭changing‬‭the‬‭password‬‭o n‬‭a‬‭router‬‭(especially‬
‭a wireless router) so that the hacker cannot redirect the DNS information.‬

‭NB: Note‬
‭-‬ ‭Viruses‬‭do‬‭not‬‭o nly‬‭infect‬‭computers,‬‭they‬‭can‬‭also‬‭affect‬‭mobile‬‭phones,‬‭MP3‬
‭players‬‭etc.‬‭–‬‭any‬‭device‬‭which‬‭can‬‭download‬‭files‬‭from‬‭a‬‭source‬‭such‬‭as‬‭the‬
‭internet is potentially at risk.‬
‭-‬ ‭Backing‬ ‭up‬ ‭may‬ ‭allow‬ ‭files‬‭that‬‭have‬‭become‬‭lost/corrupted‬‭(due‬‭to‬‭hacking‬
‭o r‬ ‭viruses)‬ ‭to‬ ‭be‬‭reinstated;‬‭however,‬‭this‬‭would‬‭not‬‭recover‬‭the‬‭system‬‭nor‬
‭would it prevent hacking/viruses affecting a system in the first place.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭30‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ P‭ roblems‬ ‭like‬ ‭spam,‬ ‭pop-ups,‬ ‭cookies,‬ ‭etc.‬ ‭are‬ ‭more‬ ‭o f‬ ‭a‬ ‭nuisance‬‭(they‬‭can‬
‭also‬‭slow‬‭down‬‭the‬‭o peration‬‭o f‬‭a‬‭computer).‬‭These‬‭can‬‭however‬‭be‬‭blocked‬
‭(or made inactive) by using suitable software.‬
‭When using the Internet, security can be enhanced using encryption.‬
‭Credit‬ ‭and‬ ‭debit‬ ‭card‬ ‭transactions‬ ‭can‬ ‭also‬ ‭be‬ ‭protected‬ ‭by‬ ‭a‬ ‭special‬ ‭type‬ ‭o f‬
‭password control.‬
‭For‬‭example,‬‭if‬‭a‬‭user‬‭chooses‬‭the‬‭password‬‭COMPUTE34‬‭to‬‭protect‬‭their‬‭credit‬‭card,‬
‭when‬ ‭they‬ ‭buy‬ ‭something‬ ‭over‬ ‭the‬ ‭internet‬ ‭the‬ ‭card‬ ‭issuer‬ ‭will‬ ‭ask‬ ‭the‬ ‭user‬ ‭an‬
‭additional‬ ‭question‬ ‭such‬ ‭as:‬ ‭“Please‬ ‭type‬ ‭in‬ ‭the‬ ‭2‬ ‭,‬ ‭4‬ ‭and‬ ‭7‬ ‭character‬ ‭o f‬ ‭your‬
‭password in the following boxes:‬
‭□‬‭□‬‭□‬‭“‬
‭The‬ ‭user‬ ‭will‬ ‭then‬ ‭type‬ ‭in‬ ‭O‬ ‭P‬ ‭E‬ ‭and‬ ‭the‬ ‭card‬ ‭purchase‬ ‭will‬ ‭be‬ ‭authorised.‬ ‭This‬
‭additional protection is used as well as encryption.‬
‭Some‬‭o f‬‭the‬‭new‬‭systems‬‭allows‬‭user‬‭slots‬‭the‬‭card‬‭into‬‭the‬‭side‬‭o f‬‭the‬‭keyboard‬‭and‬
‭is‬ ‭required‬ ‭to‬ ‭type‬ ‭in‬ ‭a‬ ‭PIN‬ ‭before‬ ‭the‬ ‭Internet‬ ‭can‬ ‭be‬ ‭accessed.‬ ‭This‬ ‭gives‬ ‭an‬
‭additional‬ ‭level‬ ‭o f‬ ‭security‬ ‭since‬ ‭it‬ ‭is‬ ‭necessary‬ ‭to‬ ‭have‬ ‭the‬ ‭card,‬ ‭know‬ ‭the‬ ‭PIN‬
‭associated with the card AND also know the user’s log in id and password!!!‬

‭ eople’s fear of the Internet‬


P
‭People’s worries about the risks when using the Internet include:‬
‭-‬ ‭Encountering‬ ‭o ffensive‬ ‭websites‬ ‭while‬ ‭searching‬ ‭for‬ ‭goods‬ ‭o r‬ ‭services,‬ ‭e.g‬
‭pornographic sites, sites with hate language, etc.‬
‭-‬ ‭downloading viruses during a transaction‬
‭-‬ ‭being‬ ‭deceived‬ ‭by‬ ‭a‬ ‭bogus‬ ‭website‬ ‭and‬ ‭paying‬ ‭for‬ ‭counterfeit‬ ‭o r‬ ‭non-existent‬
‭goods‬
‭-‬ ‭interception‬ ‭o f‬ ‭shopping‬ ‭account,‬ ‭card‬ ‭payment‬ ‭o r‬ ‭banking‬‭account‬‭information‬
‭making‬ ‭them‬ ‭vulnerable‬ ‭to‬ ‭unauthorised‬ ‭access‬ ‭to‬ ‭their‬ ‭accounts‬ ‭(‘hacking’)‬ ‭o r‬
‭fraudulent transactions‬
‭-‬ ‭Browser‬‭‘cookie’‬‭files‬‭identifying‬‭their‬‭computer‬‭to‬‭a‬‭web‬‭server,‬‭enabling‬‭a‬‭trader‬
‭to ‘retarget’ them.‬
‭-‬ ‭receiving‬ ‭unsolicited‬ ‭email‬ ‭after‬ ‭they‬ ‭have‬ ‭been‬ ‭required‬‭to‬‭supply‬‭a‬‭valid‬‭email‬
‭address in order to register for an account‬
‭-‬ ‭Erosion of local culture by global culture.‬

‭ ervices Provided by the Internet‬


S
‭1.‬ ‭Electronic‬ ‭Mail‬ ‭(E-Mail):‬ ‭A‬ ‭form‬ ‭o f‬ ‭communication‬ ‭in‬ ‭which‬ ‭written/typed‬
‭messages‬ ‭are‬ ‭send‬ ‭electronically‬ ‭over‬ ‭networked‬ ‭computers.‬ ‭In-order‬ ‭to‬ ‭send‬ ‭and‬
‭receive e-mails, the following is needed.‬
‭(a) An internet connection‬
‭(b) An E-mail Address for both the sender and receiver‬‭:‬
‭-‬ ‭This is a unique identifier of the storage location of a person’s mailbox.‬
‭-‬ ‭An‬ ‭e-mail‬ ‭address‬ ‭is‬ ‭made‬ ‭up‬ ‭o f‬ ‭two‬ ‭parts‬ ‭that‬ ‭are‬ ‭separated‬ ‭by‬ ‭the‬ ‭“@”‬
‭symbol, for example,‬‭[email protected]‬‭.‬
‭-‬ ‭The‬ ‭first‬ ‭part‬ ‭(kapondenit)‬ ‭is‬‭the‬‭username‬‭and‬‭is‬‭used‬‭to‬‭identify‬‭the‬‭name‬
‭o f the person or organisation that has the mailbox. The username is unique.‬
‭-‬ ‭The‬‭second‬‭part‬‭(gmail)‬‭is‬‭the‬‭domain‬‭name‬‭and‬‭is‬‭used‬‭to‬‭identify‬‭the‬‭server‬
‭where the person has a mailbox.‬
‭-‬ ‭The other part (the one after the dot (.) indicates the domain type e. g‬
‭o ‬ ‭. com – commercial organisation‬
‭o ‬ ‭. edu – educational organisation‬
‭o ‬ ‭. org – non-profit making organisation, etc‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭31‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ A ‭ n‬ ‭e-mail‬ ‭address‬ ‭should‬ ‭be‬ ‭known‬ ‭by‬ ‭many‬ ‭people‬ ‭so‬ ‭that‬ ‭they‬ ‭will‬‭know‬
‭the address where to send the emails.‬
‭-‬ ‭Every mailbox is protected from illegal access by use of password.‬
‭-‬ ‭A‬ ‭password‬ ‭is‬ ‭a‬ ‭secret‬ ‭group‬ ‭o f‬ ‭alphanumeric‬ ‭characters‬ ‭used‬ ‭to‬‭protect‬‭a‬
‭document from unauthorised access.‬
‭-‬ ‭NB.‬‭When‬‭creating‬‭an‬‭e-mail,‬‭o ne‬‭is‬‭requested‬‭to‬‭enter‬‭the‬‭password‬‭twice‬‭in‬
‭o rder to verify if it is the one you intend to use.‬
‭-‬ ‭Mailbox‬‭:‬ ‭-‬ ‭An‬ ‭electronic‬ ‭folder‬‭used‬‭to‬‭store‬‭electronic‬‭mails.‬‭It‬‭contains‬‭the‬
‭inbox;‬ ‭which‬ ‭contains‬ ‭incoming‬ ‭mails;‬ ‭and‬‭the‬‭o utbox;‬‭which‬‭is‬‭used‬‭to‬‭save‬
‭o utgoing messages.‬

‭Process of sending e-mail‬


‭-‬ ‭the user first logs on to email address,‬
‭-‬ ‭the sender composes the message and attaches a file (if required)‬
‭-‬ ‭The user then sends it by clicking on the send button.‬
‭-‬ ‭The message is transmitted to the sender’s ISP/central host server.‬
‭-‬ ‭The message is stored on a central host computer of the sender.‬
‭-‬ ‭The mail server examines the address of the message‬
‭-‬ ‭The message is transmitted to the recipient’s ISP mail server‬
‭-‬ ‭The message is stored in the recipient’s electronic mail box.‬
‭-‬ ‭The addressee logs in to a local computer and receives the mail‬

‭ eading/retrieving the message‬


R
‭-‬ ‭the recipient logs on to their mail server‬
‭-‬ ‭the‬ ‭message‬ ‭is‬ ‭then‬ ‭retrieved‬ ‭from‬ ‭the‬ ‭inbox‬ ‭and‬ ‭sent‬ ‭to‬ ‭the‬ ‭recipient’s‬
‭computer‬
‭-‬ ‭the recipient reads own message (can be printed if there is need)‬

‭Advantages of e-mails as compared to ordinary mails‬


‭●‬ ‭It‬‭is‬‭very‬‭fast‬‭in‬‭sending‬‭messages‬‭(can‬‭be‬‭delivered‬‭promptly‬‭while‬‭o rdinary‬
‭mails can take days to reach their destination).‬
‭●‬ ‭It‬ ‭is‬‭very‬‭cheap‬‭to‬‭send‬‭e-mails‬‭since‬‭there‬‭is‬‭no‬‭need‬‭for‬‭envelopes,‬‭stamps,‬
‭paper and pen, which are needed in conventional mail.‬
‭●‬ ‭They are reliable since e-mails rarely get lost.‬
‭●‬ ‭E-mails‬ ‭are‬ ‭time‬ ‭independent‬ ‭as‬ ‭they‬ ‭can‬ ‭be‬‭send‬‭any‬‭time‬‭o f‬‭the‬‭day‬‭o ther‬
‭than conventional mails which can be send during the normal working hours.‬
‭●‬ ‭E-mails‬ ‭allow‬ ‭multiple‬‭addressing,‬‭that‬‭is,‬‭o ne‬‭e-mail‬‭message‬‭can‬‭be‬‭send‬‭to‬
‭several recipients simultaneously without having to retype it.‬
‭●‬ ‭E-mails can be saved for future use or reference.‬
‭●‬ ‭E-mails‬ ‭are‬ ‭more‬ ‭convenient‬ ‭to‬ ‭use‬ ‭as‬ ‭there‬ ‭is‬‭no‬‭need‬‭to‬‭travel‬‭to‬‭the‬‭post‬
‭o ffice or to shops to buy stamps and envelopes.‬
‭●‬ ‭In‬ ‭e-mails,‬ ‭attachments‬ ‭in‬ ‭form‬ ‭o f‬ ‭reports,‬‭scanned‬‭documents,‬‭pictures‬‭and‬
‭curriculum vitae can easily be attached to the e-mail.‬
‭●‬ ‭there are no language problems (systems can translate messages sent)‬
‭●‬ ‭-‬‭it‬‭is‬‭possible‬‭to‬‭read‬‭emails‬‭whenever‬‭you‬‭want‬‭–‬‭there‬‭are‬‭no‬‭issues‬‭o f‬‭time‬
‭differences‬ ‭as‬ ‭would‬ ‭be‬ ‭the‬ ‭case‬ ‭with‬ ‭video‬ ‭conferencing.‬ ‭If‬‭some‬‭delegates‬
‭lived‬‭in‬‭the‬‭USA‬‭and‬‭the‬‭o thers‬‭lived‬‭in‬‭India,‬‭for‬‭example,‬‭the‬‭time‬‭difference‬
‭is 10 to 14 hours which could be a problem)‬

‭Disadvantages of e-mail‬
‭●‬ ‭Not everyone has equipment to send e-mails.‬
‭●‬ ‭Junk mail (spam) is a problem.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭32‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭‬
● ‭ ou waste a lot of time looking through mails that are just adverts.‬
Y
‭●‬ ‭E-mails are not as secure as traditional mails.‬
‭●‬ ‭The system relies on people checking their mails regularly.‬
‭●‬ ‭Old people feel left out as they consider themselves too old to learn.‬
‭●‬ ‭Equipment‬‭used‬‭to‬‭send‬‭and‬‭receive‬‭e-mails‬‭is‬‭very‬‭expensive‬‭as‬‭compared‬‭to‬
‭traditional methods.‬

‭ owever,‬‭despite‬‭the‬‭increase‬‭in‬‭the‬‭use‬‭o f‬‭e-mail,‬‭there‬‭has‬‭been‬‭a‬‭sharp‬‭increase‬‭in‬
H
‭the amount of paper used. This is because:‬
‭●‬ ‭People‬ ‭print‬ ‭copies‬ ‭for‬ ‭meetings‬ ‭and‬ ‭then‬ ‭destroy‬ ‭them‬ ‭afterwards,‬ ‭but‬ ‭if‬
‭needed again, print out another copy.‬
‭●‬ ‭Some people find it difficult reading large amounts of text on the screen.‬
‭●‬ ‭People‬‭o ften‬‭e-mail‬‭colleagues‬‭rather‬‭than‬‭use‬‭the‬‭phone‬‭who‬‭then‬‭print‬‭o ut‬
‭the document.‬

‭ .‬ ‭Teleconferencing:‬ ‭A‬ ‭method‬ ‭o f‬ ‭conducting‬ ‭discussion‬ ‭with‬ ‭several‬ ‭people‬ ‭in‬


2
‭different locations using the telephone.‬

‭ .‬ ‭Video‬ ‭conferencing:‬ ‭Conducting‬ ‭meetings‬ ‭with‬ ‭several‬ ‭people‬ ‭in‬ ‭different‬


3
‭locations‬ ‭and‬ ‭seeing‬ ‭each‬ ‭o ther‬ ‭o n‬ ‭the‬ ‭screen‬ ‭o f‬ ‭networked‬ ‭computers.‬ ‭Video‬
‭images‬ ‭and‬ ‭audio‬‭are‬‭seen/heard‬‭in‬‭real‬‭time‬‭o n‬‭large‬‭monitors/through‬‭speakers.‬
‭Delegates‬ ‭do‬ ‭not‬ ‭need‬ ‭to‬ ‭leave‬ ‭their‬ ‭homes‬ ‭o r‬ ‭work‬ ‭places‬ ‭o r‬ ‭conference‬ ‭rooms.‬
‭Video conferencing requires the following:‬
‭●‬ ‭A‬‭computer‬‭with‬‭a‬‭codec‬‭(which‬‭converts‬‭and‬‭compresses‬‭analogue‬‭data‬‭into‬
‭digital data for sending down digital lines.)‬
‭●‬ ‭Video cameras or Webcam to take video images‬
‭●‬ ‭Microphone to speak through.‬
‭●‬ ‭Loud Speakers for delegates’ voices to be heard.‬
‭●‬ ‭Large and high resolution monitor.‬
‭●‬ ‭Internet/WAN/modem to transmit data‬
‭●‬ ‭An‬ ‭integrated‬ ‭Services‬ ‭Digital‬ ‭Network‬ ‭(ISDN)‬ ‭line‬ ‭with‬‭a‬‭high‬‭bandwidth‬‭to‬
‭transmit video data at fast speed.‬
‭●‬ ‭Sound card.‬
‭●‬ ‭Video card‬
‭●‬ ‭Compression software to compress video and sound‬
‭●‬ ‭which‬ ‭converts‬ ‭and‬ ‭compresses‬ ‭analogue‬ ‭data‬ ‭into‬ ‭digital‬ ‭data‬ ‭for‬ ‭sending‬
‭down digital lines‬
‭●‬ ‭requirement‬ ‭for‬ ‭echo‬ ‭cancellation‬ ‭software‬ ‭(this‬ ‭allows‬ ‭talking‬ ‭in‬ ‭real‬ ‭time‬
‭and keeps communications synchronised)‬

‭How the video conferencing is done‬


‭-‬ ‭delegates, while in different locations, speak into central microphone‬
‭-‬ ‭webcam takes video images in real time‬
‭-‬ ‭delegates hear speech through loud speaker system‬
‭-‬ ‭system uses internet/WAN/broadband modem to transmit data‬
‭-‬ ‭uses of compression software/CODEC‬
‭-‬ ‭use echo cancellation software‬

‭Advantages of tele and video conferencing‬


‭●‬ ‭It cuts transport cost incurred in travelling to the venue of the meeting.‬
‭●‬ ‭Reduces costs involving paying hotel bills and meals for the delegates.‬
‭●‬ ‭Saves time spend in travelling to the venue of the meeting.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭33‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ I‭ t‬ ‭becomes‬ ‭safer‬ ‭for‬ ‭employees‬ ‭since‬ ‭no‬ ‭travelling‬ ‭is‬ ‭done‬ ‭(no‬ ‭travelling‬
‭accidents).‬
‭●‬ ‭There is no need for delegates to leave home/office.‬
‭●‬ ‭It becomes easier for several delegates to take part simultaneously.‬
‭●‬ ‭communication‬‭links‬‭are‬‭now‬‭much‬‭faster‬‭therefore‬‭images,‬‭sound‬‭quality‬‭etc.‬
‭are now far better‬
‭●‬ ‭safety‬ ‭reasons‬ ‭(increase‬ ‭in‬ ‭world-wide‬ ‭terrorist‬ ‭activity,‬ ‭frequent‬ ‭travelling,‬
‭etc. are all risks to company employees if they have to travel to meetings)‬
‭●‬ ‭improvements‬ ‭to‬ ‭the‬ ‭work/general‬ ‭environment‬ ‭(employees‬ ‭can‬ ‭work‬ ‭from‬
‭home,‬
‭●‬ ‭Less‬ ‭travel‬ ‭means‬ ‭less‬ ‭stress‬ ‭to‬ ‭employees‬ ‭but‬ ‭also‬ ‭means‬ ‭less‬ ‭pollution,‬
‭disabled employees are no longer disadvantaged, etc.‬
‭●‬ ‭more economical to have short notice meetings‬

‭Disadvantages of video and tele-conferencing‬


‭●‬ ‭Communication expenses are very high.‬
‭●‬ ‭Hardware and software requirements are expensive.‬
‭●‬ ‭People will lack personal contact and will socialize less.‬
‭●‬ ‭The‬ ‭hardware‬ ‭and‬ ‭software‬ ‭needed‬ ‭to‬ ‭run‬ ‭video‬ ‭conferencing‬ ‭is‬ ‭very‬
‭sophisticated and expensive.‬
‭●‬ ‭Confidential‬‭documents‬‭may‬‭need‬‭to‬‭be‬‭seen‬‭in‬‭their‬‭o riginal‬‭form,‬‭which‬‭may‬
‭be difficult in this situation‬
‭●‬ ‭There is no direct eye contact, which plays a large role in group discussions.‬
‭●‬ ‭The quality of video or audio may be low, depending on the bandwidth.‬
‭●‬ ‭There may be interruptions due to breakdowns in transmission‬
‭●‬ ‭Power cuts may prevent the conference from continuing.‬

‭ .‬‭View‬‭data‬‭(videotext)‬‭systems:‬‭These‬‭are‬‭interactive‬‭systems‬‭o n‬‭which‬‭users‬
4
‭view‬ ‭data‬ ‭when‬‭they‬‭access‬‭specialized‬‭databases‬‭like‬‭Prestel.‬‭The‬‭requirements‬
‭include:‬
‭●‬ ‭the telephone line or cable TV,‬
‭●‬ ‭specialized keyboard and‬
‭●‬ ‭A Television set.‬

I‭ nformation‬‭o n‬‭the‬‭database‬‭is‬‭provided‬‭by‬‭companies‬‭that‬‭advertise‬‭their‬‭products‬
‭like‬ ‭news,‬ ‭weather‬ ‭reports,‬ ‭and‬ ‭so‬ ‭o n.‬ ‭View‬ ‭data‬ ‭systems‬ ‭have‬ ‭the‬ ‭following‬
‭advantages:‬
‭●‬ ‭they are interactive and‬
‭●‬ ‭service is provided for free to the public.‬

‭However‬‭, its requirements are expensive.‬

‭ .‬ ‭Teletext:‬ ‭It‬ ‭is‬ ‭a‬ ‭broadcast‬ ‭service‬ ‭that‬ ‭comes‬ ‭as‬ ‭a‬ ‭television‬ ‭transmission.‬ ‭It‬ ‭is‬
5
‭cheaper than the internet service. However, it is non-interactive.‬

‭ .‬ ‭Facsimile‬ ‭(Fax):‬ ‭A‬ ‭method‬ ‭whereby‬ ‭o utput‬ ‭from‬ ‭a‬ ‭scanned‬ ‭document‬ ‭is‬ ‭send‬
6
‭over‬ ‭telephone‬ ‭line‬ ‭and‬ ‭reproduce‬ ‭o n‬ ‭a‬ ‭fax‬ ‭machine‬ ‭o n‬ ‭the‬ ‭receiving‬ ‭end.‬ ‭Fax‬
‭method has the following advantages:‬
‭●‬ ‭It is very cheap to send messages.‬
‭●‬ ‭It is very easy to use.‬
‭●‬ ‭It is a very fast method of sending messages.‬
‭However, it has the following disadvantages:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭34‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ‬ I‭ ts requirements are expensive (fax machine).‬

‭●‬ ‭There‬ ‭must‬ ‭be‬ ‭a‬ ‭person‬ ‭at‬ ‭the‬ ‭receiving‬ ‭end‬ ‭to‬ ‭attend‬ ‭to‬ ‭the‬ ‭fax‬ ‭when‬
‭receiving messages.‬

‭ B‬‭:‬ ‭The‬ ‭use‬ ‭o f‬ ‭fax,‬ ‭e-mail,‬ ‭view‬ ‭data,‬ ‭teletext,‬ ‭teleconferencing‬ ‭and‬ ‭video‬
N
‭conferencing in an office brings about an electronic (paperless) office.‬
‭-‬ ‭An‬‭electronic‬‭o ffice‬‭is‬‭an‬‭o ffice‬‭in‬‭which‬‭the‬‭storage‬‭and‬‭processing‬‭o f‬‭data‬‭as‬‭well‬
‭as communication are done electronically.‬
‭-‬ ‭An electronic office is efficient because:‬
‭●‬ ‭Communication is easier and faster.‬
‭●‬ ‭Less paperwork is involved.‬
‭●‬ ‭Current and up-to-date information is provided.‬
‭●‬ ‭Ensures a clean office environment.‬

‭ owever‬‭, it is very expensive to setup and maintain‬‭an electronic office.‬


H
‭*‬‭NB‬‭-‬ ‭The‬ ‭use‬ ‭o f‬ ‭computers‬ ‭to‬ ‭perform‬ ‭all‬ ‭clerical‬ ‭and‬ ‭o ffice‬ ‭duties‬ ‭is‬ ‭called‬ ‭Office‬
‭Automation.‬

‭-‬ T ‭ ele‬ ‭and‬ ‭video‬ ‭conferencing‬ ‭as‬ ‭well‬ ‭as‬ ‭networking‬ ‭bring‬‭about‬‭tele-commuting‬
‭(tele-working). Tele-commuting is carrying out work without leaving home.‬
‭-‬ ‭Communication is done through networked computers.‬
‭-‬ ‭Requirements‬‭for‬‭telecommuting‬‭includes:‬‭modem,‬‭very‬‭fast‬‭communication‬‭links‬
‭(for example telephone line), computers, internet services, etc.‬

‭Benefits of telecommuting‬
‭-‬ ‭Easier to concentrate on work in a quiet environment than in a noisy office.‬
‭-‬ ‭It‬ ‭saves‬ ‭time‬ ‭spent‬ ‭in‬ ‭travelling‬ ‭to‬ ‭the‬ ‭work‬ ‭place‬ ‭thereby‬ ‭increasing‬
‭productivity.‬
‭-‬ ‭It cut costs involved in travelling to work place.‬
‭-‬ ‭The‬ ‭employer‬ ‭saves‬ ‭costs‬ ‭o f‬ ‭o ffice‬ ‭space‬ ‭and‬ ‭overheads‬ ‭like‬ ‭water‬ ‭and‬
‭electricity.‬
‭-‬ ‭People can be recruited from a wide geographical area.‬
‭-‬ ‭People with disabilities like the handicapped can be employed.‬
‭-‬ ‭People in different locations can work as a team.‬

‭Disadvantages of tele-commuting‬
‭-‬ ‭Workforce not in office is difficult to control.‬
‭-‬ ‭Workers‬ ‭would‬ ‭not‬ ‭understand‬ ‭corporate‬ ‭goals‬ ‭and‬ ‭will‬ ‭not‬ ‭be‬ ‭loyal‬ ‭to‬‭the‬
‭o rganisation.‬
‭-‬ ‭Employees‬ ‭feel‬ ‭isolated‬ ‭and‬ ‭miss‬ ‭the‬ ‭environment‬ ‭o f‬ ‭an‬ ‭o ffice‬ ‭full‬ ‭o f‬
‭colleagues.‬
‭-‬ ‭People may find it difficult to work in teams.‬
‭-‬ ‭It is difficult to separate work from home duties while at home.‬
‭-‬ ‭Unions find it difficult to mobilise workers for demonstrations and strike.‬

‭ .‬‭File‬‭Transfer‬‭:‬‭allows‬‭users‬‭to‬‭transfer‬‭files‬‭from‬‭host‬‭computers‬‭o n‬‭the‬‭internet‬
7
‭to their personal computers.‬

‭ .‬ ‭News‬ ‭groups‬‭:‬ ‭a‬ ‭global‬ ‭electronic‬ ‭bulletin‬‭board‬‭system‬‭in‬‭which‬‭users‬‭exchange‬


8
‭information on different topics.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭35‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ .‬‭Entertainment‬‭:‬‭the‬‭internet‬‭provides‬‭an‬‭o ption‬‭for‬‭users‬‭to‬‭download‬‭and‬‭listen‬
9
‭to music, newspapers, radio stations, etc.‬

‭ 0.‬ ‭Internet‬ ‭Shopping‬‭:‬ ‭(Internet‬ ‭buying,‬ ‭electronic‬ ‭commerce,‬ ‭o nline‬ ‭shopping):‬


1
‭The‬‭internet‬‭provides‬‭a‬‭facility‬‭for‬‭customers‬‭to‬‭purchase‬‭products‬‭from‬‭the‬‭internet‬
‭without visiting shops. Credit cards are used in internet buying.‬

‭ dvantages of buying from the internet‬


A
‭To the customers‬
‭-‬ ‭Programs are available to search for the cheapest products on offer.‬
‭-‬ ‭Customers have more time to choose.‬
‭-‬ ‭Shopping is done any time of the day, thus providing a 24 hour service.‬
‭-‬ ‭A wide choice of products is available.‬
‭-‬ ‭Shopping can be done by setting up a file.‬
‭-‬ ‭It‬ ‭is‬ ‭very‬ ‭convenient‬ ‭to‬ ‭use‬ ‭as‬ ‭customers‬ ‭do‬ ‭not‬ ‭leave‬ ‭their‬ ‭homes‬ ‭for‬
‭shopping.‬
‭-‬ ‭It cut travelling costs to the shops.‬
‭-‬ ‭Customers do shopping without being jostled by crowds.‬
‭-‬ ‭There are less cases of impulse buying.‬
‭-‬ ‭Product reviews are obtainable before purchase.‬
‭-‬ ‭Goods and services usually cheaper on the internet.‬
‭-‬ ‭Customer need not to go to shop and therefore save travelling time.‬

‭To businesses/shop managers‬


‭-‬ ‭Business‬ ‭is‬ ‭carried‬ ‭o ut‬ ‭any‬ ‭time‬ ‭o f‬ ‭the‬ ‭day‬ ‭(provides‬ ‭a‬ ‭24‬ ‭hour‬ ‭shopping‬
‭service).‬
‭-‬ ‭Increases sales due to greater number of customers from all over the world.‬
‭-‬ ‭No wastage space for goods is involved.‬
‭-‬ ‭Ensures huge saving on overheads like rent, warehousing, employee facilities.‬
‭-‬ ‭More goods can be made available.‬
‭-‬ ‭It is cheaper to use as there are no leaflets, pamphlets, etc.‬
‭-‬ ‭Can reduce the number of shops on the streets.‬
‭-‬ ‭Organisations can employ fewer workers thereby cutting labour costs.‬
‭-‬ ‭No need to travel to the shop as business can be run from home.‬

‭ isadvantages of buying from the internet‬


D
‭To customers‬
‭-‬ ‭There are chances of losing money through credit card fraud and hacking.‬
‭-‬ ‭Customers lack interaction with others.‬
‭-‬ ‭Customers fear of rogue companies (customers may not receive the goods).‬
‭-‬ ‭Customers cannot physically see the goods before purchasing.‬
‭-‬ ‭Not everyone has a computer and is connected to the internet.‬
‭-‬ ‭Not everyone has credit cards.‬
‭-‬ ‭Problem‬‭o f‬‭spam‬‭(Unwanted‬‭e-mail,‬‭usually‬‭o f‬‭a‬‭commercial‬‭nature‬‭sent‬‭o ut‬‭in‬
‭bulk).‬
‭-‬ ‭Customers cannot have the goods immediately.‬

‭To businesses‬
‭-‬ ‭Increase in cases of industrial espionage.‬
‭Industrial‬ ‭espionage‬ ‭involves‬ ‭selling‬ ‭o f‬ ‭company‬ ‭secrets‬ ‭by‬ ‭employees‬ ‭to‬ ‭rival‬
‭companies‬ ‭and‬ ‭the‬ ‭use‬ ‭o f‬ ‭destructive‬ ‭methods‬ ‭by‬ ‭competitors‬ ‭to‬ ‭destroy‬ ‭o ther‬
‭o rganisations.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭36‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Effects of E-Commerce and E-banking To the Community‬


‭Positive effects‬ ‭Negative effects‬
‭Shops and banks are open 24/7‬ ‭Close down of shops/banks in city centres‬
‭Access to shops and banks is worldwide‬ ‭Increased risk of fraud/hacking‬
‭Less pollution since less travelling‬ ‭Less personal service/more impersonal‬
‭Disabled people are not disadvantaged‬ ‭Loss of jobs due to closures of‬
‭(no need to travel)‬ ‭shops/banks‬
‭Busy people can shop/bank when they‬ ‭Less social interaction between people –‬
‭want and where they want‬ ‭just sit at home using computer‬
‭If you live in a remote area, it is much‬ ‭Less activity for people – leads to a less‬
‭easier to access shops/banks‬ ‭healthy/overweight population‬
‭Less expensive (cost savings to shop/‬ ‭Less environmentally friendly since more‬
‭bank + more competition – savings are‬ ‭goods sent out by post – waste from‬
‭passed on to the customer)‬ ‭packaging significantly increases‬
‭Less money is spent in travelling‬ ‭The‬ ‭gap‬ ‭between‬ ‭the‬ ‭rich‬ ‭and‬ ‭the‬ ‭poor‬
‭widens‬‭as‬‭the‬‭rich‬‭get‬‭savings‬‭from‬‭shopping‬
‭o n-line.‬
‭Increase in small businesses.‬ ‭Lower‬ ‭profits‬ ‭for‬ ‭companies‬ ‭that‬ ‭do‬ ‭not‬
‭engage in e-commerce.‬
‭Decline‬‭in‬‭leisure‬‭shopping‬‭as‬‭goods‬‭are‬ ‭deskilling‬ ‭o f‬ ‭the‬ ‭work‬ ‭force‬ ‭(e.g‬ ‭CAD‬ ‭has‬
‭bought on-line.‬ ‭taken‬‭over‬‭draftsman‬‭skills,‬‭word‬‭processors‬
‭have‬ ‭taken‬ ‭over‬ ‭many‬ ‭o ffice-based‬ ‭duties,‬
‭etc.)‬

‭ ‬ ‭lot‬ ‭o f‬ ‭money‬ ‭is‬ ‭wasted‬ ‭by‬ ‭the‬ ‭need‬ ‭to‬ ‭re-train‬ ‭the‬ ‭workforce‬ ‭in‬ ‭the‬ ‭use‬ ‭o f‬ ‭new‬
A
‭software/computers‬

‭ omputer‬ ‭systems‬ ‭have‬‭allowed‬‭companies‬‭to‬‭set‬‭up‬‭call‬‭centres‬‭in‬‭o ther‬‭countries‬


C
‭where‬ ‭potential‬ ‭cost‬ ‭savings‬ ‭can‬ ‭be‬ ‭made.‬ ‭This,‬‭o f‬‭course,‬‭can‬‭lead‬‭to‬‭job‬‭losses‬‭in‬
‭the host country.‬

‭Advantage to companies adopting call centres overseas includes:‬


‭-‬ ‭if‬ ‭strikes‬ ‭o r‬ ‭o ther‬ ‭problems‬ ‭o ccur‬ ‭in‬ ‭o ne‬ ‭country‬ ‭it‬ ‭is‬ ‭possible‬ ‭to‬ ‭transfer‬
‭work elsewhere‬
‭-‬ ‭reduced costs in countries where labour costs are lower‬
‭-‬ ‭reduced‬‭costs‬‭due‬‭to‬‭incentives/grants‬‭by‬‭countries‬‭keen‬‭to‬‭set‬‭up‬‭call‬‭centre‬
‭o ffices‬
‭-‬ ‭round‬‭the‬‭clock‬‭customer‬‭support‬‭(one‬‭o f‬‭the‬‭advantages‬‭o f‬‭time‬‭differences‬
‭is the possibility of 24/7 cover)‬

‭Disadvantages to having call centres overseas:‬


‭-‬ ‭language and culture problems‬
‭-‬ ‭animosity‬ ‭(hatred/enmity)‬ ‭to‬ ‭overseas‬ ‭call‬ ‭centres‬ ‭(leading‬ ‭to‬ ‭loss‬ ‭o f‬
‭customers)‬
‭-‬ ‭need for extensive re-training which is time consuming and expensive‬
‭-‬ ‭time‬ ‭differences‬ ‭(can‬ ‭lead‬ ‭to‬ ‭health‬ ‭problems‬ ‭in‬ ‭call‬ ‭centre‬ ‭work‬‭force‬‭who‬
‭need to work unsocial hours to target key markets)‬
‭-‬ ‭Technology‬ ‭differences‬ ‭between‬ ‭different‬ ‭countries‬ ‭(does‬ ‭the‬ ‭infrastructure‬
‭exist to service high tech equipment?)‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭37‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭THE CASHLESS SOCIETY‬
‭ his‬‭refers‬‭to‬‭the‬‭paying‬‭for‬‭goods‬‭and‬‭services‬‭without‬‭the‬‭use‬‭o f‬‭notes‬‭and‬‭coins.‬‭It‬
T
‭is‬ ‭the‬ ‭use‬ ‭o f‬ ‭electronic‬ ‭commerce‬ ‭thereby‬‭reducing‬‭handling‬‭o f‬‭hard‬‭cash‬‭amongst‬
‭individuals.‬ ‭However,‬ ‭it‬ ‭seems‬ ‭impossible‬ ‭to‬ ‭completely‬ ‭have‬ ‭a‬ ‭complete‬ ‭cashless‬
‭society. Services that contribute towards a cashless society include:‬
‭-‬ ‭EDI‬‭(Electronic‬‭Data‬‭Interchange)-‬‭is‬‭an‬‭electronic‬‭communication‬‭system‬‭that‬
‭provides‬ ‭standards‬ ‭for‬ ‭exchanging‬ ‭data‬ ‭via‬ ‭any‬ ‭electronic‬ ‭means,‬ ‭e.g.‬
‭purchase orders, invoices, shipping notices, etc.‬
‭-‬ ‭Mobile banking‬
‭-‬ ‭Mobile money transfers-Ecocash, Telecash, OneWallet, etc‬
‭-‬ ‭Internet banking‬
‭-‬ ‭Electronic commerce/internet buying‬
‭-‬ ‭EFTPOS-Electronic Funds Transfer at Point of Sale.‬
‭-‬ ‭Credits cards/debit cards, coupons, etc‬

‭Benefits of A cashless society‬


‭-‬ ‭More‬ ‭convenient‬ ‭to‬ ‭pay‬ ‭bills,‬ ‭mortgage‬ ‭loans,‬ ‭gas,‬ ‭phone‬ ‭and‬ ‭electricity‬ ‭bills‬
‭since these are paid automatically.‬
‭-‬ ‭Customers‬‭no‬‭longer‬‭need‬‭to‬‭carry‬‭large‬‭sums‬‭o f‬‭money‬‭thereby‬‭reducing‬‭cases‬
‭o f robbery.‬
‭-‬ ‭Customers no longer need to queue on banks to get cash.‬

‭Problems of a Cashless Society:‬


‭-‬ ‭Credit‬‭is‬‭normally‬‭given‬‭o nly‬‭to‬‭those‬‭who‬‭are‬‭working‬‭and‬‭have‬‭a‬‭steady‬‭source‬
‭o f income.‬
‭-‬ ‭People will spend more than they can afford thereby getting into debt.‬
‭-‬ ‭Wrong‬ ‭information‬ ‭about‬ ‭individuals‬ ‭is‬‭kept‬‭as‬‭more‬‭information‬‭about‬‭people‬
‭is kept in computers for their credit rating.‬
‭-‬ ‭It is difficult for individuals to track how much they spent.‬

‭INTRANET‬
‭-‬ I‭ ntranet‬ ‭stands‬ ‭for‬ ‭INTernal‬ ‭Restricted‬ ‭Access‬ ‭NETwork,‬ ‭which‬ ‭is‬ ‭a‬ ‭restricted‬
‭private‬‭o rganisation’s‬‭network‬‭that‬‭uses‬‭internet‬‭technologies‬‭for‬‭the‬‭benefits‬‭o f‬
‭such an organisation.‬
‭-‬ ‭An‬‭intranet‬‭is‬‭a‬‭computer‬‭network‬‭based‬‭o n‬‭internet‬‭technology‬‭that‬‭is‬‭designed‬
‭to‬ ‭meet‬ ‭the‬ ‭internal‬ ‭needs‬ ‭for‬ ‭sharing‬ ‭information‬ ‭within‬ ‭a‬ ‭single‬
‭o rganisation/company‬
-‭ ‬ ‭Intranet requires password entry.‬
‭-‬ ‭Intranet is protected by a firewall.‬
‭-‬ ‭Intranet only gives local information relevant to the company/organisation‬
‭-‬ ‭It is possible to block access to certain sites using the intranet, e.g Facebook.‬
‭-‬ ‭it is not always necessary to have external modems when using intranets‬
‭-‬ ‭information for use on intranets is stored on local servers‬

‭Many companies use intranets as well as the internet for the following reasons:‬
‭-‬ ‭it is safer since there is less chance of external hacking or viruses‬
‭-‬ ‭it is possible to prevent employees from accessing unwanted web sites‬
‭-‬ ‭companies‬‭can‬‭ensure‬‭that‬‭the‬‭information‬‭available‬‭is‬‭specific‬‭to‬‭their‬‭needs‬
‭o nly‬
‭-‬ ‭it is easier to keep “sensitive” messages to remain within the company only‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭38‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Differences between internet and Intranet‬
‭Internet‬ ‭Intranet‬
‭the INTERNET is INTERnational NETwork‬ a‭ n‬ ‭INTRANET‬ ‭is‬‭INTernal‬‭Restricted‬‭Access‬
‭NETwork‬
‭Internet‬‭gives‬‭all‬‭information‬‭including‬‭that‬ ‭the‬ ‭intranet‬ ‭o nly‬ ‭gives‬ ‭local‬ ‭information‬
‭which is not relevant to the organisation‬ ‭relevant to the company/organisation‬
‭Always‬ ‭need‬ ‭external‬ ‭modems‬ ‭for‬‭internet‬ ‭it‬ ‭is‬ ‭not‬ ‭always‬ ‭necessary‬ ‭to‬ ‭have‬ ‭external‬
‭connections‬ ‭modems when using intranets‬
‭Information‬ ‭o n‬ ‭internet‬ ‭saved‬ ‭in‬ ‭different‬ ‭information‬ ‭for‬ ‭use‬ ‭o n‬ ‭intranets‬ ‭is‬ ‭stored‬
‭computers‬ ‭o n local servers‬
‭the‬ ‭internet‬ ‭can‬ ‭be‬ ‭accessed‬ ‭from‬ ‭Intranet‬ ‭is‬‭accessed‬‭within‬‭the‬‭range‬‭o f‬‭the‬
‭anywhere‬ ‭o rganisation’s network‬
‭the‬ ‭internet‬ ‭is‬ ‭available‬ ‭to‬ ‭anyone‬ ‭without‬ ‭whereas‬ ‭the‬ ‭intranet‬ ‭requires‬ ‭password‬
‭password restriction‬ ‭entry‬

‭ xtranet‬‭:‬ ‭It‬ ‭is‬‭an‬‭intranet‬‭made‬‭available‬‭o ff‬‭-site‬‭to‬‭members‬‭o r‬‭business‬‭partners‬


E
‭o f‬ ‭an‬ ‭o rganisation.‬ ‭It‬ ‭is‬ ‭an‬ ‭extension‬ ‭o f‬ ‭the‬ ‭intranet‬ ‭giving‬ ‭authorized‬ ‭o utsiders‬
‭controlled access to the intranet.‬

‭WIRELESS TECHNOLOGY (WIFI) AND BROADBAND‬


‭ roadband‬‭:‬ ‭a‬ ‭communications‬ ‭network‬ ‭that‬ ‭provides‬ ‭for‬ ‭high‬ ‭quality‬ ‭and‬ ‭high‬
B
‭speed‬ ‭voice,‬ ‭data‬ ‭and‬ ‭video‬ ‭transmission‬ ‭usually‬ ‭over‬ ‭o ne‬ ‭channel‬ ‭in‬ ‭wireless‬
‭networks or over high bandwidth media like fiber optics and satellites.‬

‭ ireless Communication:‬
W
‭This‬ ‭is‬ ‭a‬ ‭method‬ ‭o f‬ ‭networking‬ ‭(linking)‬ ‭computers‬ ‭and‬ ‭computer‬ ‭devices‬‭without‬
‭the‬ ‭use‬ ‭o f‬ ‭cabling‬‭(wires),‬‭e.g.‬‭using‬‭Bluetooth,‬‭radio,‬‭satellite,‬‭infra-red,‬‭microwave,‬
‭etc. The devices that can be used in wireless technology include:‬
‭-‬ ‭Mobile phones /cell phone/remote key pad/remote control/ remote keyboard.‬
‭-‬ ‭Infra-red mouse.‬
‭-‬ ‭Multimedia mobile handsets and notebooks.‬
‭-‬ ‭GPRS (General Packet Radio Service) modems.‬
‭-‬ ‭Wireless‬ ‭LAN(or‬ ‭Wi-Fi‬ ‭–Wireless‬ ‭Fidelity:‬ ‭A‬ ‭local‬ ‭area‬ ‭network‬ ‭that‬ ‭uses‬ ‭high‬
‭frequency‬ ‭radio‬ ‭signals‬ ‭to‬ ‭transmit‬ ‭and‬ ‭receive‬ ‭data‬ ‭over‬ ‭distances‬ ‭o f‬ ‭a‬ ‭few‬
‭hundred feet; uses Ethernet protocol).‬
‭-‬ ‭PDAs (personal digital assistants).‬

‭Advantages of wireless communication‬


‭-‬ ‭Cheaper as no wires are needed for networking.‬
‭-‬ ‭Ensures fast wireless Internet access.‬
‭-‬ ‭Wireless LAN is faster than a modem or mobile.‬
‭-‬ ‭Wireless LAN enables working at home.‬
‭-‬ ‭Users‬‭can‬‭create‬‭and‬‭send‬‭multimedia‬‭messages‬‭to‬‭mobiles‬‭o r‬‭e-mail‬‭while‬‭in‬
‭transit.‬
‭-‬ ‭Users can send greetings from mobiles to mobiles/PCs.‬
‭-‬ ‭Ensures instant transmission.‬
‭-‬ ‭Users‬ ‭can‬ ‭download‬ ‭e-mail‬ ‭and‬ ‭file‬ ‭attachments‬ ‭while‬ ‭o n‬ ‭mobile.‬ ‭Users‬ ‭can‬
‭watch live web cast on mobile.‬
‭-‬ ‭Users can listen to streaming video on mobile.‬
‭-‬ ‭Users can watch news, weather, sport, games while travelling.‬
‭-‬ ‭Users can access information from mobile anytime.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭39‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ U ‭ sers can send, receive, delete e-mail while travelling.‬
‭-‬ ‭Users can view business appointments while out of office on mobile.‬
‭-‬ ‭Users‬‭can‬‭send‬‭corporate‬‭e-mail‬‭while‬‭o ut‬‭o f‬‭o ffice‬‭-‬‭even‬‭behind‬‭a‬‭firewall‬‭o n‬
‭mobile.‬
‭-‬ ‭Users‬ ‭can‬ ‭use‬ ‭wireless‬ ‭internet‬ ‭connection‬ ‭from‬ ‭chat‬ ‭rooms‬‭for‬‭discussions‬
‭with colleagues while travelling.‬

‭ ost‬ ‭areas‬ ‭in‬‭the‬‭world‬‭now‬‭o ffer‬‭broadband‬‭rather‬‭than‬‭dial‬‭up‬‭for‬‭connecting‬‭to‬


M
‭the internet. The advantages of broadband over dial up include:‬
‭-‬ ‭the system is always “on”-no need to dial into ISP every time you want access‬
‭-‬ ‭the‬ ‭connection‬ ‭rate/data‬ ‭transfer‬ ‭rate‬ ‭is‬ ‭much‬ ‭higher‬ ‭(for‬‭example‬‭broadband‬
‭o perates at 11 000 kbps compared to the dial up rate of 60 kbps)‬
‭-‬ ‭there‬ ‭is‬ ‭a‬ ‭flat‬ ‭monthly‬ ‭rate‬ ‭with‬ ‭broadband‬ ‭(dial‬ ‭up‬ ‭is‬ ‭charged‬ ‭per‬ ‭hour‬ ‭o f‬
‭usage)‬
‭-‬ ‭it‬ ‭is‬ ‭possible‬ ‭to‬ ‭use‬ ‭the‬ ‭telephone‬ ‭at‬ ‭the‬ ‭same‬ ‭as‬ ‭the‬ ‭internet‬ ‭with‬
‭broadband/the line isn’t tied up‬
‭-‬ ‭broadband permits other facilities such as “skype”‬
‭-‬ ‭Wireless‬ ‭technology‬ ‭(WiFi)‬ ‭allows‬ ‭connection‬ ‭o f‬ ‭a‬ ‭computer‬ ‭to‬ ‭the‬ ‭Internet‬
‭without‬ ‭the‬ ‭need‬ ‭for‬ ‭connecting‬ ‭cables.‬ ‭A‬ ‭router‬ ‭(containing‬ ‭a‬ ‭modem‬ ‭and‬
‭external‬ ‭aerial)‬ ‭is‬ ‭connected‬ ‭to‬ ‭a‬ ‭telephone‬ ‭line‬ ‭and‬ ‭it‬ ‭is‬ ‭then‬‭possible‬‭for‬‭any‬
‭computer‬‭within‬‭range‬‭to‬‭communicate‬‭with‬‭the‬‭router‬‭and‬‭allow‬‭Internet‬‭access‬
‭–‬ ‭the‬ ‭link‬ ‭between‬ ‭computer‬ ‭and‬ ‭router‬ ‭is‬ ‭completely‬ ‭wireless..‬ ‭The‬ ‭main‬
‭advantage‬ ‭o f‬ ‭doing‬ ‭this‬ ‭is‬ ‭clearly‬ ‭the‬ ‭portability‬ ‭(i.e.‬ ‭can‬ ‭go‬ ‭anywhere‬ ‭within‬
‭range since no wires are needed).‬

‭ isadvantages of Wireless Technology‬


D
‭-‬ ‭Wireless‬ ‭LAN‬ ‭speeds‬ ‭are‬ ‭slower‬ ‭than‬ ‭Net‬ ‭access‬ ‭at‬ ‭work‬ ‭due‬ ‭to‬ ‭narrow‬
‭bandwidth.‬
‭-‬ ‭Anyone‬‭within‬‭the‬‭Wireless‬‭LAN‬‭nodes‬‭range‬‭with‬‭an‬‭appropriate‬‭device‬‭can‬‭use‬
‭your Wireless LAN and broad band link.‬
‭-‬ ‭Anyone‬‭who‬‭walks‬‭past‬‭your‬‭house‬‭o r‬‭WLAN‬‭linked‬‭into‬‭a‬‭corporate‬‭system‬‭can‬
‭access sensitive information like credit card details.‬
‭-‬ ‭3G phones are not compatible with 2G phones.‬
‭-‬ ‭Signals can be blocked, distorted or will be weak.‬
‭-‬ ‭Can lead to health problems from microwaves‬
‭-‬ ‭the range can be very limited, e.g. using Bluetooth.‬
‭-‬ ‭possible interference from nearby electronic devices‬
‭-‬ ‭security issues (i.e. tapping illegally into WiFi networks) is very common‬
‭-‬ ‭access speed/transfer rate is often slower using wireless systems‬

I‭ t‬ ‭isn’t‬ ‭just‬ ‭computers‬ ‭that‬ ‭can‬ ‭be‬ ‭linked‬ ‭without‬ ‭wires,‬ ‭various‬ ‭peripheral‬‭devices‬
‭can‬ ‭be‬ ‭linked‬ ‭to‬ ‭a‬ ‭computer‬ ‭system‬ ‭without‬ ‭the‬ ‭need‬ ‭for‬ ‭a‬ ‭physical,‬ ‭wired‬
‭connection.‬
‭For example:‬
‭- Printers‬
‭- Keyboards‬
‭- Mouse‬
‭- Digital cameras‬

‭COMPUTERS IN ENTERTAINMENT‬
‭Music‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭40‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ omputers‬‭are‬‭now‬‭used‬‭for‬‭playing‬‭and‬‭composing‬‭music.‬‭Computer‬‭hardware‬‭and‬
C
‭software‬ ‭advances‬ ‭have‬ ‭changed‬ ‭how‬ ‭music‬ ‭is‬ ‭generated‬ ‭and‬ ‭produced.‬ ‭Software‬
‭used includes Fruit Loops, Virtual DJ, etc.‬
‭Musical‬ ‭instruments‬ ‭can‬ ‭be‬ ‭connected‬ ‭to‬ ‭a‬ ‭MIDI‬ ‭(Musical‬ ‭Instrument‬ ‭Digital‬
‭Interface).‬
‭MIDI‬ ‭is‬ ‭a‬ ‭type‬ ‭o f‬ ‭serial‬ ‭interface‬ ‭built‬ ‭into‬‭a‬‭piece‬‭o f‬‭electrical‬‭equipment‬‭so‬‭that‬‭it‬
‭can‬ ‭communicate‬ ‭with‬ ‭the‬ ‭computer.‬ ‭It‬ ‭also‬ ‭converts‬ ‭o utput‬ ‭signals‬ ‭from‬ ‭the‬
‭instrument, e.g. guitar, into digital form.‬
‭Some‬‭o f‬‭the‬‭key‬‭reasons‬‭for‬‭the‬‭widespread‬‭development‬‭o f‬‭music‬‭using‬‭computers‬
‭are:‬
‭-‬ ‭the recording process for music is faster‬
‭-‬ ‭there is no need for tapes during the recording process‬
‭-‬ ‭It is easier to remove or add sounds to a track.‬
‭-‬ ‭Sampling of sounds is very easy‬
‭-‬ ‭actual musical notes can be generated from the music itself by software‬
‭-‬ ‭music‬‭samplers‬‭and‬‭mixers‬‭give‬‭an‬‭almost‬‭limitless‬‭ability‬‭to‬‭alter‬‭the‬‭o riginal‬
‭tracks recorded in a studio‬
‭-‬ ‭don’t need to understand music notation to write a musical score‬
‭-‬ ‭electric‬‭instruments‬‭(such‬‭as‬‭guitars‬‭and‬‭o rgans)‬‭play‬‭back‬‭through‬‭electronic‬
‭machines‬
‭-‬ ‭synthesisers combine simple wave forms to produce more complex sounds‬
‭-‬ ‭electric‬ ‭o rgans‬ ‭can‬ ‭now‬ ‭mimic‬ ‭almost‬ ‭any‬ ‭instrument‬ ‭(including‬ ‭a‬ ‭full‬
‭o rchestra)‬
‭-‬ ‭automatic rhythm‬
‭-‬ ‭music notes automatically printed out in the correct format‬
‭-‬ ‭There‬‭are‬‭many‬‭o ther‬‭software‬‭and‬‭hardware‬‭developments;‬‭the‬‭above‬‭is‬‭just‬
‭a summary of the more common elements.‬
‭-‬ ‭A‬ ‭performance‬ ‭can‬ ‭be‬ ‭directly‬ ‭recorded‬ ‭o nto‬ ‭the‬ ‭computer‬ ‭and‬ ‭stored‬ ‭in‬‭a‬
‭MIDI file, which can be edited later.‬
‭-‬ ‭Synthesisers‬ ‭are‬ ‭also‬ ‭used‬ ‭to‬ ‭generate‬ ‭notes‬ ‭and‬ ‭desired‬ ‭sounds‬ ‭from‬
‭pre-recorded‬ ‭electrical‬ ‭signals.‬ ‭These‬ ‭signals‬ ‭can‬ ‭be‬ ‭combined‬ ‭with‬ ‭signals‬
‭from conventional instruments and recorded to produce songs.‬
‭Music can be compressed to produce MP3 (motion picture expert) format.‬
‭Music‬ ‭can‬ ‭be‬ ‭played‬ ‭using‬ ‭software‬ ‭like‬‭Microsoft‬‭Windows‬‭Media‬‭Player,‬‭JetAudio,‬
‭Nero Show Time, Real Player, etc.‬

‭ANIMATION/CARTOONS IN FILMS AND VIDEO/TELEVISION‬


‭ omputer Graphics‬
C
‭These‬ ‭are‬ ‭computer‬ ‭generated‬ ‭images‬ ‭designed‬ ‭by‬ ‭graphic‬ ‭artists‬ ‭for‬ ‭producing‬
‭logos,‬ ‭news‬ ‭inserts,‬ ‭cartoons,‬ ‭animations,‬ ‭etc.‬ ‭The‬ ‭artists‬ ‭use‬ ‭graphic‬ ‭software‬ ‭like‬
‭Microsoft Paint. 3-D images can also be produced using graphics packages.‬

I‭ mage‬ ‭processing‬‭:‬ ‭The‬ ‭images‬ ‭can‬ ‭be‬ ‭darkened,‬ ‭sharpened,‬ ‭changed‬ ‭colour,‬
‭cropped, etc.‬

‭ nimation‬
A
‭-‬ ‭Animation‬ ‭consists‬ ‭o f‬ ‭displaying‬ ‭a‬ ‭rapid‬ ‭succession‬ ‭o f‬ ‭2-D‬ ‭o r‬ ‭3-D‬ ‭graphics‬
‭arrangements‬‭to‬‭create‬‭the‬‭illusion‬‭o f‬‭movement.‬‭It‬‭is‬‭used‬‭for‬‭web‬‭presentations‬
‭and advertisements and for film.‬
‭-‬ ‭Computer‬‭animation‬‭is‬‭the‬‭art‬‭o f‬‭creating‬‭moving‬‭images‬‭via‬‭computer‬‭hardware‬
‭and software.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭41‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ F ‭ or‬ ‭3-D‬ ‭animation,‬ ‭o bjects‬ ‭are‬ ‭designed‬ ‭o n‬ ‭a‬ ‭computer‬ ‭and‬ ‭a‬ ‭3-D‬ ‭skeleton‬ ‭is‬
‭produced.‬
‭-‬ ‭The‬‭limbs,‬‭mouth,‬‭eyes,‬‭etc.‬‭are‬‭moved‬‭by‬‭the‬‭animator‬‭using‬‭key‬‭frames.‬‭A‬‭frame‬
‭can just be a picture/graphic image.‬
‭-‬ ‭A start and end of frame is produced.‬
‭-‬ ‭Software is used to produce animation between the different frames automatically.‬
‭-‬ ‭The‬‭differences‬‭in‬‭appearance‬‭between‬‭key‬‭frames‬‭are‬‭automatically‬‭calculated‬‭by‬
‭the‬ ‭computer‬ ‭–‬ ‭this‬ ‭is‬ ‭called‬ ‭TWEENING‬ ‭o r‬ ‭MORPHING.‬ ‭The‬ ‭animation‬ ‭is‬‭finally‬
‭RENDERED (i.e. turned into a realistic image).‬
‭-‬ ‭Computer‬ ‭animation‬ ‭uses‬ ‭a‬ ‭technique‬ ‭called‬ ‭avars‬ ‭(animation‬ ‭variable)‬ ‭which‬
‭control all movement of the animated character.‬
‭-‬ ‭Finally,‬‭surfaces‬‭are‬‭added‬‭requiring‬‭a‬‭process‬‭called‬‭rendering‬‭(i.e.‬‭turned‬‭into‬‭a‬
‭realistic image).‬
‭-‬ ‭avars‬‭can‬‭be‬‭set‬‭manually‬‭using‬‭a‬‭joystick.‬‭Software‬‭produces‬‭a‬‭level‬‭o f‬‭quality‬‭for‬
‭movie‬ ‭animation‬ ‭that‬ ‭would‬ ‭take‬ ‭many‬ ‭years‬ ‭to‬ ‭produce‬ ‭by‬ ‭hand‬ ‭and‬ ‭would‬
‭employ several cartoonists/animators.‬
‭-‬ ‭This all saves considerable time and money to the film and television producers.‬

‭-‬ A ‭ vatars‬ ‭are‬ ‭another‬ ‭example‬ ‭o f‬ ‭animation.‬ ‭These‬ ‭are‬ ‭o ften‬ ‭used‬ ‭to‬ ‭represent‬
‭people‬‭either‬‭in‬‭3-D‬‭(as‬‭used‬‭in‬‭computer‬‭games)‬‭and‬‭in‬‭2-D‬‭(as‬‭used‬‭in‬‭internet‬
‭message boards).‬
‭-‬ ‭Some‬ ‭avatars‬ ‭are‬ ‭animated‬ ‭consisting‬ ‭o f‬ ‭a‬ ‭sequence‬ ‭o f‬ ‭images‬ ‭played‬ ‭o ne‬‭after‬
‭the other.‬
‭-‬ ‭Ultimately,‬ ‭animators‬ ‭want‬ ‭to‬ ‭create‬ ‭a‬ ‭human‬ ‭image‬ ‭which‬ ‭moves‬ ‭and‬ ‭interacts‬
‭with‬‭its‬‭background‬‭in‬‭such‬‭a‬‭way‬‭that‬‭the‬‭viewers‬‭can’t‬‭tell‬‭if‬‭a‬‭particular‬‭scene‬‭is‬
‭computer‬ ‭generated‬ ‭o r‬ ‭produced‬ ‭by‬ ‭real‬ ‭actions‬ ‭in‬ ‭front‬ ‭o f‬ ‭an‬ ‭actual‬ ‭movie‬
‭camera.‬
‭-‬ ‭Sounds‬ ‭can‬ ‭be‬ ‭added‬ ‭to‬ ‭the‬ ‭animation‬ ‭to‬‭produce‬‭advertisements,‬‭cartoons‬‭and‬
‭films.‬
‭-‬ ‭Computers‬ ‭with‬ ‭large‬ ‭hard‬ ‭disk‬ ‭and‬ ‭powerful‬ ‭processors‬‭are‬‭needed,‬‭as‬‭well‬‭as‬
‭high resolution monitors‬
‭-‬ ‭Special‬ ‭effects‬ ‭in‬ ‭many‬ ‭modern‬ ‭films‬ ‭(televisions)‬ ‭all‬ ‭use‬‭computer‬‭animation‬‭to‬
‭produce fantasy worlds.‬

‭COMPUTER BASED TRAINING (CBT)‬


-‭ ‬ C ‭ BT makes use of a computer system to train people in a number of applications.‬
‭-‬ ‭It‬‭makes‬‭use‬‭o f‬‭multimedia‬‭and‬‭self-assessment‬‭with‬‭minimum‬‭input‬‭needed‬‭from‬
‭a human trainer.‬
‭-‬ ‭The advantages of training people using computer systems (such as CBT) include:‬
‭●‬ ‭trainees can work at their own speed‬
‭●‬ ‭trainees can learn when they want‬
‭●‬ ‭it is possible to re-run sections of the training program if necessary‬
‭●‬ ‭possible to come back at any time/pause training program at any point‬
‭●‬ ‭user gets immediate assessment of performance‬
‭●‬ ‭possible to include multi-media elements in the training package‬
‭●‬ ‭no‬‭need‬‭to‬‭have‬‭a‬‭teacher/classroom‬‭–‬‭potential‬‭cost‬‭savings‬‭therefore‬
‭possible‬
‭●‬ ‭it is easier to keep up to date/amend‬

‭AUTOMATIC STOCK CONTROL SYSTEM IN A SUPERMARKET‬


‭At the POS terminal, the hardware required includes:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭42‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭(a)‬‭Input Hardware‬‭:‬
‭-‬ ‭barcode‬ ‭reader‬ ‭(automatically‬ ‭enter‬ ‭details‬ ‭o f‬ ‭goods‬ ‭purchased‬ ‭into‬ ‭the‬
‭computer by scanning them),‬
‭-‬ ‭keyboard‬ ‭(manually‬ ‭typing‬ ‭in‬ ‭product‬ ‭code‬‭if‬‭the‬‭barcode‬‭reader‬‭fails‬‭to‬‭do‬
‭so),‬
‭-‬ ‭mouse (selecting item by clicking)‬
‭-‬ ‭touch screen‬‭: for selecting menu and entering data‬‭into the computer‬
‭-‬ ‭swiping machine‬‭: for entering PIN and swiping debit‬‭cards‬
‭(b)‬‭Output Devices‬‭:‬
‭-‬ ‭printer‬‭(producing receipts),‬
‭-‬ ‭monitor‬ ‭(VDU)‬ ‭-displays‬ ‭item‬ ‭details‬ ‭and‬ ‭items‬‭that‬‭are‬‭being‬‭purchased‬‭by‬
‭the client, amount paid and change‬

‭(c) Communication devices‬


‭-‬ ‭Network‬‭Cables‬‭:‬‭connecting‬‭the‬‭VDU‬‭to‬‭the‬‭main‬‭computer‬‭in‬‭the‬‭manager’s‬
‭o ffice‬
‭-‬ ‭Telephone‬ ‭line/high‬ ‭distance‬ ‭communication‬ ‭link‬‭:‬ ‭for‬ ‭o nline‬ ‭linkage‬ ‭o f‬
‭the POS terminal and the bank.‬

‭ rocedure of automatic stock control‬


P
‭-‬ ‭bar‬‭codes‬‭are‬‭attached‬‭to‬‭all‬‭goods/items‬‭sold‬‭by‬‭the‬‭supermarket‬‭as‬‭a‬‭means‬
‭o f identification‬
‭-‬ ‭each bar code is associated with a stock file on a computer database‬
‭-‬ ‭the customer takes their basket/trolley to the POS terminal‬
‭-‬ ‭the‬ ‭bar‬ ‭code‬ ‭o n‬ ‭the‬ ‭product‬ ‭is‬ ‭scanned‬ ‭at‬ ‭the‬ ‭point‬ ‭o f‬ ‭sale‬ ‭(POS)‬ ‭terminal‬
‭using the barcode reader‬
‭-‬ ‭if‬ ‭the‬ ‭bar‬ ‭code‬ ‭can’t‬ ‭be‬ ‭read,‬ ‭the‬ ‭POS‬ ‭o perator‬ ‭has‬ ‭to‬ ‭key‬ ‭in‬ ‭the‬ ‭bar‬ ‭code‬
‭number manually using a keyboard/key pad‬
‭-‬ ‭the bar code is searched from the database‬
‭-‬ ‭o nce the bar code is identified/found, the appropriate file/record is accessed‬
‭-‬ ‭the price of the good/item is found and sent back to the POS‬
‭-‬ ‭the stock level of the item is reduced by 1‬
‭-‬ ‭if‬ ‭the‬ ‭stock‬ ‭level‬ ‭is‬ ‭less‬ ‭than‬ ‭o r‬ ‭equal‬ ‭to‬ ‭the‬ ‭re-order/minimum‬ ‭stock‬ ‭level‬
‭then the system automatically re-orders goods/items from the suppliers‬
‭-‬ ‭this‬‭procedure‬‭is‬‭repeated‬‭until‬‭all‬‭the‬‭items‬‭in‬‭the‬‭customer’s‬‭basket/trolley‬
‭have scanned‬
‭-‬ ‭when‬ ‭all‬ ‭items/goods‬ ‭have‬ ‭been‬ ‭scanned,‬ ‭the‬ ‭customer‬ ‭is‬‭given‬‭an‬‭itemised‬
‭bill showing a list (with prices) of everything they have bought‬
‭-‬ ‭the computer also updates the files containing the daily takings‬
‭-‬ ‭if‬ ‭the‬ ‭customer‬ ‭has‬ ‭a‬ ‭loyalty‬ ‭card,‬ ‭the‬ ‭system‬ ‭automatically‬ ‭updates‬ ‭their‬
‭points total‬
‭-‬ ‭when new goods arrive, the bar codes are used to update the stock files‬
‭-‬ ‭some‬ ‭newer‬ ‭supermarkets‬ ‭now‬ ‭allow‬ ‭customers‬ ‭to‬ ‭scan‬ ‭their‬ ‭own‬
‭basket/trolley‬ ‭and‬ ‭pay‬ ‭for‬ ‭the‬ ‭items/goods‬ ‭using‬ ‭credit‬ ‭card‬ ‭o r‬ ‭cash‬
‭(essentially the stock control system is the same for both methods)‬

‭ he‬ ‭POS‬ ‭terminals‬ ‭can‬ ‭also‬ ‭be‬ ‭connected‬ ‭to‬ ‭the‬ ‭main‬ ‭server‬ ‭in‬ ‭banks‬ ‭like‬ ‭CABS,‬
T
‭Barclays,‬ ‭etc.‬ ‭This‬ ‭enables‬ ‭customers‬ ‭to‬ ‭purchase‬ ‭goods‬ ‭electronically‬ ‭without‬ ‭the‬
‭burden‬ ‭o f‬ ‭carrying‬ ‭cash‬‭around.‬‭This‬‭is‬‭called‬‭Electronic‬‭Funds‬‭Transfer‬‭at‬‭Point‬
‭of‬ ‭Sale‬ ‭(EFTPOS).‬ ‭Customers‬ ‭can‬ ‭also‬ ‭be‬ ‭given‬ ‭cash‬ ‭back‬ ‭at‬ ‭the‬ ‭EFTPOS‬ ‭after‬
‭purchasing goods using debit cards.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭43‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ fter‬‭purchasing‬‭the‬‭goods,‬‭a‬‭receipt‬‭is‬‭produced.‬‭The‬‭receipt‬‭will‬‭have‬‭the‬‭following‬
A
‭details:‬
‭-‬ ‭date of purchase,‬
‭-‬ ‭time purchased,‬
‭-‬ ‭shop attendant,‬
‭-‬ ‭item (s) bought,‬
‭-‬ ‭quantity bought,‬
‭-‬ ‭unit price,‬
‭-‬ ‭total price,‬
‭-‬ ‭amount tendered,‬
‭-‬ ‭change,‬
‭-‬ ‭cashier name‬
‭-‬ ‭etc.‬

‭Advantages of Electronic POS terminal to supermarket workers‬


‭-‬ ‭no need to remember (memorise) price of goods‬
‭-‬ ‭their work load is reduced‬
‭-‬ ‭ensures accurate calculation of customer change‬
‭-‬ ‭ensures better working environment which means less stress‬
‭-‬ ‭fast means of entering data which is less manual‬

‭Advantages of Electronic POS terminal to customers‬


‭-‬ ‭customers are served quickly‬
‭-‬ ‭customers are assured that their change is correctly calculated‬
‭-‬ ‭customers can get cash back if the POS is linked to banks‬
‭-‬ ‭no‬ ‭need‬ ‭for‬ ‭customers‬ ‭to‬ ‭carry‬ ‭cash‬ ‭around‬ ‭o nce‬ ‭the‬ ‭system‬ ‭is‬ ‭linked‬ ‭to‬
‭banks thereby reduces theft of their cash‬

‭Advantages of Electronic POS terminal to supermarket managers‬


‭-‬ ‭It is automatic and more accurate to control stock.‬
‭-‬ ‭Automatic updating of stock file is ensured.‬
‭-‬ ‭Automatic reordering of stock items is involved.‬
‭-‬ ‭Less staff and wages needed.‬
‭-‬ ‭Sales statistics are always available.‬
‭-‬ ‭Faster throughput is ensured.‬
‭-‬ ‭Itemised receipts are produced quickly.‬
‭-‬ ‭The system records every transaction.‬
‭-‬ ‭The system records staff work rates.‬
‭-‬ ‭Less pilfering by staff as it is easier to identify pilfering.‬
‭-‬ ‭Fewer errors are produced. Faster calculations are made.‬
‭-‬ ‭There is no need to remember prices of goods.‬
‭-‬ ‭Manager‬ ‭is‬ ‭freed‬ ‭from‬ ‭the‬ ‭task‬ ‭o f‬ ‭manually‬ ‭counting‬ ‭the‬ ‭stock‬ ‭items‬ ‭and‬
‭placing some orders.‬

‭ B‬‭.‬ ‭The‬ ‭system‬ ‭updates‬ ‭the‬ ‭master‬ ‭file‬ ‭when‬ ‭an‬ ‭item‬ ‭is‬ ‭sold.‬ ‭It‬ ‭first‬ ‭searches‬ ‭the‬
N
‭master‬ ‭file.‬ ‭Using‬‭the‬‭barcode‬‭number‬‭(or‬‭product‬‭code)‬‭it‬‭decrease‬‭the‬‭number‬‭in‬
‭stock and increase the quantity sold‬

*‭ NB:‬ ‭POS‬ ‭–Point‬ ‭of‬ ‭Sale‬ ‭terminal:‬ ‭the‬ ‭point‬ ‭where‬ ‭customers‬ ‭pay‬ ‭for‬ ‭goods‬
‭purchased in shops, either by cash or otherwise.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭44‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ifference‬ ‭between‬ ‭Electronic‬ ‭Point‬ ‭Of‬ ‭Sale‬ ‭(EPOS)‬ ‭and‬ ‭Electronic‬ ‭Funds‬
D
‭Transfer at Point Of Sale (EFTPOS).‬
‭EPOS‬‭terminal‬‭o nly‬‭involves‬‭scanning‬‭o f‬‭goods‬‭electronically‬‭by‬‭use‬‭o f‬‭barcodes‬‭and‬
‭by‬‭keyboard‬‭entry.‬‭EFTPOS‬‭involves‬‭electronic‬‭scanning‬‭o f‬‭goods‬‭at‬‭point‬‭o f‬‭sale‬‭by‬
‭use‬ ‭o f‬ ‭scanners‬ ‭and‬ ‭barcodes‬ ‭(and‬ ‭use‬ ‭o f‬ ‭keyboard)‬ ‭and‬ ‭has‬ ‭an‬ ‭added‬ ‭feature‬‭o f‬
‭allowing‬ ‭customers‬ ‭to‬ ‭transfer‬ ‭money‬ ‭from‬ ‭o ne‬ ‭account‬ ‭to‬ ‭another,‬ ‭usually‬ ‭to‬ ‭the‬
‭account‬ ‭o f‬ ‭the‬ ‭shop‬ ‭where‬ ‭the‬ ‭goods‬ ‭are‬ ‭being‬ ‭bought.‬ ‭Customers‬ ‭can‬ ‭also‬ ‭get‬
‭cash-back at the EFTPOS terminal in shops.‬

‭BASIC BINARY OPERATIONS‬


*‭ ‬‭NB‬‭. Could not compile notes on this as most, if not‬‭all, of the concepts are covered‬
‭in mathematics. However pupils should be able to perform the following:‬
‭(a) Using up to 8 bits‬
‭- Convert denary numbers to their binary equivalent‬
‭- Convert binary numbers to their denary equivalents‬
‭- Adding binary numbers together‬
‭- Subtraction of binary numbers‬

‭LOGIC GATES‬
‭-‬ A ‭ ‬ ‭logic‬ ‭gate‬ ‭is‬ ‭a‬ ‭device‬ ‭that‬ ‭produces‬ ‭signals‬ ‭o f‬ ‭1‬ ‭o r‬ ‭0‬ ‭when‬ ‭the‬ ‭input‬ ‭logic‬
‭requirements are met and are used in manipulating binary information.‬
‭-‬ ‭A‬ ‭logic‬ ‭gate‬ ‭is‬ ‭a‬ ‭device‬ ‭(or‬ ‭electrical‬ ‭circuit)‬ ‭that‬ ‭performs‬ ‭o ne‬ ‭o r‬ ‭more‬ ‭logical‬
‭o perations on one or more input signals.‬
‭-‬ ‭Its output represent‬‭Boolean‬‭(T or F) or binary values‬‭(1 or 0) as voltages.‬
‭-‬ ‭Logic gates are the building blocks of digital technology.‬
‭-‬ ‭They can be used in applications like:‬
‭●‬ ‭Building computer chips‬
‭●‬ ‭Programming traffic signals‬
‭●‬ ‭Chips for automatic alarm systems‬
‭●‬ ‭Chips for automated control systems‬
‭-‬ ‭Electronic circuits operate using binary logic gates.‬
‭-‬ ‭Logic gates process signals which represent‬‭TRUE‬‭o r‬‭FALSE,‬‭ON‬‭o r‬‭OFF‬‭,‬‭1‬‭o r‬‭0‬

‭Main Logic Gates‬

‭The main logic gates are:‬

(‭ a)‬ ‭OR gate‬


‭(b)‬ ‭AND gate‬
‭(c)‬‭NOT gate‬
‭(d)‬ ‭NOR gate‬
‭(e)‬‭NAND gate‬
‭Logic gates are used with‬‭truth tables‬‭.‬

‭●‬ A ‭ ‬‭truth‬‭table‬‭is‬‭a‬‭table‬‭which‬‭shows‬‭how‬‭a‬‭logic‬‭circuit's‬‭o utput‬‭responds‬‭to‬


‭various combinations of the inputs, using‬‭logic‬‭1‬‭for true and‬‭logic‬‭0‬‭for false.‬
‭●‬ ‭A truth table is a table that describes the behaviour of a logic gate.‬
‭●‬ ‭It lists the value of the output for every possible combination of the inputs‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭45‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ T ‭ ruth‬ ‭tables‬ ‭contains‬ ‭1s‬ ‭and‬ ‭0s‬ ‭and‬ ‭are‬ ‭an‬ ‭integral‬ ‭part‬ ‭o f‬ ‭logic‬ ‭gates‬
‭functionality.‬
‭●‬ ‭Truth table and logic gates use the following:‬
‭-‬ ‭1 (True, ON, Not False)‬
‭-‬ ‭0 (False, OFF, Not True)‬

‭ he‬ ‭number‬ ‭o f‬ ‭rows‬ ‭in‬ ‭a‬ ‭truth‬ ‭table‬ ‭shows‬ ‭the‬ ‭number‬‭o f‬‭combinations‬‭o f‬‭the‬
T
‭inputs‬‭o f‬‭a‬‭particular‬‭circuit.‬‭The‬‭number‬‭o f‬‭rows‬‭for‬‭each‬‭gate‬‭is‬‭found‬‭using‬‭the‬
‭following‬‭formulae:‬‭rows‬‭=‬‭2‭n‬ ‬ ‭,‬‭n‬‭being‬‭the‬‭number‬‭o f‬‭inputs‬‭in‬‭the‬‭gate‬‭o r‬‭circuit.‬
‭For‬ ‭example,‬ ‭a‬ ‭gate‬ ‭o r‬ ‭circuit‬ ‭has‬ ‭the‬ ‭following‬ ‭rows‬ ‭corresponding‬ ‭to‬ ‭the‬
‭number of input (excluding column headings):‬
‭-‬ ‭1 input = 2‬‭1‬‭= 2 rows‬
‭-‬ ‭2 inputs = 2‬‭2‬‭= 4 rows‬
‭-‬ ‭3 inputs = 2‬‭3‬‭= 8 rows‬
‭-‬ ‭…..‬
‭Graphical Representation of Gates and their Truth Tables‬

‭ ach‬‭logic‬‭gate‬‭has‬‭its‬‭own‬‭unique‬‭graphical‬‭representation,‬‭which‬‭can‬‭be‬‭in‬‭general‬
E
‭form or in standard form.‬

‭(1)‬‭General form‬
‭Each‬ ‭logic‬ ‭gate‬ ‭has‬ ‭a‬ ‭circle‬ ‭and‬ ‭the‬ ‭name‬ ‭o f‬ ‭the‬‭gate‬‭to‬‭differentiate‬‭it‬‭from‬
‭the rest as given below:‬

‭The name inside the gate gives us the type of the gate‬

‭(2)‬‭Standard Representation‬
‭In‬ ‭standard‬ ‭form,‬ ‭each‬ ‭logic‬ ‭gate‬ ‭has‬ ‭its‬ ‭own‬ ‭unique‬ ‭diagram.‬ ‭Even‬ ‭if‬ ‭the‬
‭name‬ ‭o f‬ ‭the‬ ‭gate‬‭is‬‭not‬‭written,‬‭o ne‬‭knows‬‭what‬‭it‬‭stands‬‭for‬‭because‬‭o f‬‭the‬
‭shape. The following are the logic gates and their shapes in standard form.‬

‭(a)‬‭OR gate‬

‭ his‬ ‭represents‬ ‭two‬ ‭inputs‬ ‭entering‬ ‭the‬ ‭gate‬ ‭and‬ ‭o ne‬ ‭o utput‬ ‭from‬ ‭the‬ ‭gate.‬
T
‭The‬ ‭inputs‬ ‭can‬ ‭be‬ ‭represented‬ ‭by‬ ‭any‬ ‭alphabetic‬ ‭characters,‬ ‭e.g.‬ ‭A‬ ‭and‬ ‭B,‬
‭while the output can be X, given as follows:‬

‭Logic Gate Diagram‬ ‭Truth table‬

‭Standard Form‬ ‭General Form‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭46‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

-‭ ‬ ‭ = A‬‭OR‬‭B‬
X
‭-‬ ‭The output (X) is‬‭true‬‭if the‬‭INPUT A OR INPUT B‬‭are‬‭true.‬
‭-‬ ‭Thus if any one of the inputs is 1, the output is automatically 1‬
‭-‬ ‭Output only becomes 0 if all inputs are 0‬

‭(b)‬‭AND gate‬
‭This is represented as follows:‬

‭Logic Gate Diagram‬ ‭Truth table‬

‭Standard Form‬ ‭General Form‬

‭ he‬‭o utput‬‭(X)‬‭is‬‭o nly‬‭true‬‭if‬‭the‬‭INPUT‬‭A‬‭AND‬‭INPUT‬‭B‬‭are‬‭both‬‭true‬‭.‬‭If‬‭any‬‭o ne‬‭o f‬


T
‭the inputs is 0, then the output becomes 0 also. Thus X = A‬‭AND‬‭B.‬

‭(c)‬ ‭NOT gate‬


‭Logic Gate Diagram‬ ‭Truth table‬

‭Standard Form‬ ‭General Form‬

‭ he‬‭NOT‬‭gate‬‭has‬‭only‬‭o ne‬‭input‬‭and‬‭o ne‬‭o utput.‬‭The‬‭input‬‭is‬‭negated.‬‭Thus‬‭if‬‭input‬


T
‭is 1, output is 0, and vice versa.‬

‭The output (X) is‬‭true‬‭when the‬‭INPUT A‬‭is‬‭NOT TRUE‬‭.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭47‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭The output (X) is‬‭False‬‭when the‬‭INPUT A‬‭is‬‭TRUE.‬

‭(d)‬ ‭NOR gate‬


‭Logic Gate Diagram‬ ‭Truth table‬

‭Standard Form‬ ‭General Form‬

-‭ ‬ T ‭ his is an‬‭OR‬‭gate with the output X inverted.‬


‭-‬ ‭The output (X) is‬‭true‬‭if‬‭NOT‬‭(‬‭INPUT A OR INPUT B‬‭)‬‭are‬‭true.‬
‭-‬ ‭Thus X = NOT (A or B)‬

‭(e)‬‭NAND gate‬
‭Logic Gate Diagram‬ ‭Truth table‬

‭Standard Form‬ ‭General Form‬

‭ his‬ ‭is‬ ‭an‬ ‭AND‬ ‭gate‬‭with‬‭the‬‭o utput‬‭X‬‭inverted.‬‭The‬‭o utput‬‭is‬‭true‬‭i‬‭f‬‭INPUT‬‭A‬‭AND‬


T
‭INPUT B‬‭are‬‭NOT‬‭both‬‭True.‬‭It translates to NOT (A‬‭and B)‬

‭Combinational Logic Gates‬

‭ ‬ ‭combination‬ ‭o f‬ ‭logic‬ ‭gates,‬ ‭which‬ ‭may‬ ‭be‬ ‭different,‬ ‭gives‬ ‭a‬ ‭logic‬ ‭circuit‬ ‭as‬ ‭given‬
A
‭below:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭48‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Boolean Expressions‬

‭ oolean‬ ‭Expressions‬ ‭are‬ ‭equivalent‬ ‭expressions‬ ‭o f‬ ‭the‬ ‭logic‬ ‭state‬ ‭o f‬ ‭gates.‬ ‭For‬
B
‭example, the Boolean expression for:‬

‭a‬‭NOT‬‭gate with input A and output C: C =‬‭NOT‬‭A‬

‭ AND‬‭and‬‭NOR‬‭gates‬‭are‬‭known‬‭as‬‭universal‬‭gates‬‭because‬‭they‬‭are‬‭inexpensive‬‭to‬
N
‭manufacture‬ ‭and‬ ‭any‬ ‭Boolean‬ ‭function‬ ‭(AND,‬ ‭OR,‬ ‭NOT)‬ ‭can‬ ‭be‬ ‭constructed‬ ‭using‬
‭o nly‬ ‭NAND‬ ‭o r‬ ‭o nly‬ ‭NOR‬ ‭gates.‬ ‭Even‬ ‭NAND‬ ‭and‬ ‭NOR‬ ‭gates‬ ‭can‬ ‭be‬ ‭used‬ ‭as‬ ‭each‬
‭o ther’s alternatives in a circuit.‬

‭Expressions and Logic Gates‬

‭ xpressions‬ ‭using‬ ‭mathematical‬ ‭symbols‬ ‭can‬ ‭be‬ ‭used‬ ‭to‬ ‭represent‬ ‭logic‬ ‭gates.‬‭One‬
E
‭may‬ ‭be‬ ‭required‬ ‭to‬ ‭draw‬ ‭logic‬ ‭gates‬ ‭using‬ ‭such‬ ‭mathematical‬ ‭expressions‬ ‭Such‬
‭symbols and their meaning are as given below:‬

‭1.‬ P ‭ lus sign (+)‬


‭-‬ ‭This means OR, e.g.‬
‭-‬ ‭C= A + B‬
‭-‬ ‭This is an OR gate, which means C = A OR B.‬

‭2.‬ M ‭ ultiplication Sign‬


‭-‬ ‭This represents an AND gate‬
‭-‬ ‭E.g C = AB,‬
‭-‬ ‭C = AxB,‬
‭-‬ ‭C = A.B‬
‭-‬ ‭C= (AB)(AC)‬
‭-‬ ‭C = (A.B).(A.C)‬
‭-‬ ‭All these are various versions of the AND gate.‬

‭3.‬ C ‭ omplement sign (‘ or – above an input)‬


‭-‬ ‭This represents a NOT gate‬
‭-‬ ‭For example: NOT A can be given as any one of the following:‬
‭●‬ ‭A’‬
‭●‬
‭Logic Gate Problems:‬

‭Question: Worked Example‬

‭ ‬ ‭steel‬ ‭rolling‬ ‭mill‬ ‭is‬ ‭to‬ ‭be‬ ‭controlled‬ ‭by‬ ‭a‬ ‭logic‬ ‭network‬ ‭made‬ ‭up‬‭o f‬‭AND,‬‭OR‬‭and‬
A
‭NOT‬‭gates‬‭o nly.‬‭The‬‭mill‬‭receives‬‭a‬‭stop‬‭signal‬‭(i.e.‬‭S‬‭=‬‭1)‬‭depending‬‭o n‬‭the‬‭following‬
‭input bits:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭49‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭A stop signal (S = 1) occurs when:‬

‭Either:‬ ‭Length, L > 100 metres and Velocity, V < =10 m/s‬

‭Or‬ ‭Temperature, T <=1000 C and Velocity, V >10 m/s‬

‭ raw‬ ‭a‬ ‭logic‬ ‭network‬ ‭and‬ ‭truth‬ ‭table‬ ‭to‬ ‭show‬ ‭all‬ ‭the‬ ‭possible‬ ‭situations‬ ‭when‬ ‭the‬
D
‭stop signal could be received.‬

‭Answer‬

‭Step 1: Deduce and Write the logic statement‬

‭-‬ T ‭ he‬ ‭first‬ ‭statement‬ ‭can‬ ‭be‬ ‭re-written‬ ‭as:‬ ‭(L‬‭=‬‭1‬‭AND‬‭V‬‭=‬‭NOT‬‭1)‬‭since‬‭Length‬‭>‬


‭100‬ ‭metres‬ ‭corresponds‬ ‭to‬ ‭a‬ ‭binary‬ ‭value‬ ‭o f‬ ‭1‬ ‭and‬ ‭Velocity‬ ‭<=10‬ ‭m/s‬
‭corresponds to a binary value of 0 (i.e. NOT 1).‬
‭-‬ ‭The second statement can be written as (T = NOT 1 AND V = 1)‬
‭-‬ ‭Both‬ ‭these‬ ‭statements‬ ‭are‬ ‭joined‬ ‭together‬ ‭by‬ ‭OR‬ ‭which‬ ‭gives‬ ‭us‬ ‭the‬ ‭logic‬
‭statement: if (L = 1 AND V = NOT 1) OR (T = NOT 1 AND V = 1) then S = 1‬
‭-‬ ‭The‬ ‭above‬ ‭statement‬ ‭can‬ ‭be‬ ‭written‬ ‭as:‬ ‭S‬ ‭=‬ ‭1‬ ‭if‬ ‭(L‬‭=‬‭1‬‭AND‬‭V‬‭=‬‭NOT‬‭1)‬‭OR‬‭(T‬‭=‬
‭NOT 1 AND V = 1)‬

‭ B‬‭:‬ ‭the‬ ‭Student‬ ‭should‬ ‭first‬ ‭of‬ ‭all‬ ‭write‬ ‭the‬ ‭following‬ ‭logic‬ ‭statement‬ ‭before‬
N
‭coming‬‭up‬‭with‬‭a‬‭truth‬‭table‬‭or‬‭logic‬‭c ircuit‬‭as‬‭this‬‭has‬‭some‬‭marks‬‭awarded‬‭to‬
‭it., i.e.‬

‭S = 1 if (L = 1 AND V = NOT 1) OR (T = NOT 1 AND V = 1)‬

‭Step 2: Logic Circuit‬

‭-‬ U
‭ sing‬ ‭the‬ ‭logic‬ ‭statement‬ ‭above,‬ ‭o ne‬ ‭can‬ ‭now‬ ‭draw‬ ‭the‬ ‭logic‬ ‭circuit‬ ‭as‬ ‭given‬
‭below:‬

‭Step 3: Truth Table‬

‭-‬ ‭One can now draw the truth table, basing from the logic statement in Step 1.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭50‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Questions‬

‭ .‬ ‭A‬ ‭computer‬ ‭will‬ ‭o nly‬ ‭o perate‬ ‭if‬ ‭three‬ ‭switches‬ ‭P,‬ ‭S‬ ‭and‬ ‭T‬ ‭are‬ ‭correctly‬ ‭set.‬ ‭An‬
1
‭o utput‬‭signal‬‭(X‬‭=‬‭1)‬‭will‬‭o ccur‬‭if‬‭R‬‭and‬‭S‬‭are‬‭both‬‭ON‬‭o r‬‭if‬‭R‬‭is‬‭OFF‬‭and‬‭S‬‭and‬‭T‬‭are‬
‭ON. Design a logic network and draw the truth table for this network.‬

‭2. A traffic signal system will only operate if it receives an output signal (D = 1).‬

‭This can only occur if:‬

‭Either‬ ‭(a) signal A is red (i.e. A = 0)‬

‭Or (b) signal A is green (i.e. A = 1) and signals B and C are both red (i.e. B‬

‭and C are both 0)‬

‭Design a logic network and draw a truth table for the above system.‬

‭ .‬‭A‬‭chemical‬‭plant‬‭gives‬‭o ut‬‭a‬‭warning‬‭signal‬‭(W‬‭=‬‭1)‬‭when‬‭the‬‭process‬‭goes‬‭wrong.‬
3
‭A logic network is used to provide input and to decide whether or not W = 1‬

‭A warning signal (W = 1) will be generated if‬

‭either :‬ ‭(a) Chemical Rate < 10 m /s‬

‭o r‬ ‭(b) Temperature > 87 C and Concentration > 2 moles‬

‭o r‬ ‭(c) Chemical rate = 10 m /s and Temperature > 87 C‬

‭ raw‬ ‭a‬ ‭logic‬ ‭network‬ ‭and‬ ‭truth‬ ‭table‬ ‭to‬ ‭show‬ ‭all‬ ‭the‬ ‭possible‬ ‭situations‬ ‭when‬ ‭the‬
D
‭warning signal could be received‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭51‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ .‬ ‭A‬ ‭power‬ ‭station‬ ‭has‬ ‭a‬ ‭safety‬ ‭system‬ ‭based‬ ‭o n‬ ‭three‬‭inputs‬‭to‬‭a‬‭logic‬‭network.‬‭A‬
4
‭warning‬ ‭signal‬ ‭(S‬ ‭=‬‭1)‬‭is‬‭produced‬‭when‬‭certain‬‭conditions‬‭o ccur‬‭based‬‭o n‬‭these‬‭3‬
‭inputs:‬

‭A warning signal (S = 1) will be generated if:‬

‭Either : (a) Temperature > 120C and Cooling Water <= 100 l/hr‬

‭Or‬ ‭(b)‬‭Temperature‬‭<=‬‭120C‬‭and‬‭(Pressure‬‭>‬‭10‬‭bar‬‭o r‬‭Cooling‬‭Water‬‭<‬‭100‬


‭l/hr)‬

‭ raw‬ ‭a‬ ‭logic‬ ‭network‬ ‭and‬ ‭truth‬ ‭table‬ ‭to‬ ‭show‬ ‭all‬ ‭the‬ ‭possible‬ ‭situations‬ ‭when‬ ‭the‬
D
‭warning signal could be received.‬

‭ . Draw a circuit diagram for δ = (xy' + x'y)z‬


5
‭6. Device a suitable Boolean expression and truth table for the circuit below:‬

‭ . Draw circuits for following Boolean statements.‬


7
‭a. If A AND B are on AND C AND D are on then output is on.‬
‭b. If A OR B are on AND C OR D are on then output is on.‬
‭c. If A OR B is on then output is off.‬
‭d. If B AND C is off OR A is on then output is on.‬
‭e. If A is off AND B OR C is on AND D is off then output is on.‬
‭f. If A is on AND B AND C are off AND D is on then output is on.‬
‭g. If smoke detector (S) is on OR fire alarm (F) is on then sprinkler (W) is on.‬

‭8. a. Simplify the following logic equations by using the rules of Boolean algebra.‬

‭a. A • C + A • B • C‬

‭b. (A + B) • (B + Ā )‬

‭c. A • (Ā + C) + C‬

‭ .‬ ‭For‬ ‭each‬ ‭o f‬ ‭the‬ ‭previous‬ ‭questions,‬ ‭create‬ ‭a‬ ‭circuit‬ ‭for‬ ‭the‬ ‭Boolean‬ ‭expression‬
b
‭before simplification.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭52‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ AM(COMPUTER-AIDED MANUFACTURE)‬
C
‭This‬ ‭is‬ ‭automated‬ ‭manufacturing‬ ‭process‬ ‭where‬ ‭computers‬ ‭are‬ ‭used‬ ‭to‬ ‭regulate‬
‭(control) and monitor the production process in industries.‬
‭CAM uses some industrial robots or computer-controlled sensors for detecting:‬
‭●‬ ‭Excessive heat‬
‭●‬ ‭Faults‬
‭●‬ ‭Acceleration forces‬
‭CAM works well with CAD systems. Machinery is programmed automatically‬
‭A‬ ‭real‬ ‭CAD/CAM‬ ‭system‬ ‭enables‬ ‭any‬ ‭engineering‬ ‭component‬ ‭to‬ ‭be‬ ‭designed‬ ‭and‬
‭manufactured‬‭using‬‭numerically‬‭controlled‬‭machine‬‭tools.‬‭The‬‭computer‬‭make‬‭some‬
‭calculations‬ ‭for‬ ‭defining‬ ‭the‬ ‭tool‬ ‭path‬ ‭and‬ ‭generates‬ ‭the‬ ‭instructions‬ ‭necessary‬ ‭to‬
‭produce‬ ‭the‬ ‭part.‬‭A‬‭machine‬‭tool‬‭such‬‭as‬‭a‬‭lathe‬‭is‬‭controlled‬‭by‬‭a‬‭computer‬‭which‬
‭sends it instructions to select tools and to use them to make metal components.‬
‭CAM‬‭and‬‭CAD‬‭system‬‭systems‬‭are‬‭integrated.‬‭Data‬‭from‬‭CAD‬‭system‬‭is‬‭converted‬‭to‬‭a‬
‭set‬‭o f‬‭instructions‬‭for‬‭the‬‭processor‬‭controlling‬‭the‬‭CAM‬‭equipment.‬‭Once‬‭a‬‭part‬‭has‬
‭been‬ ‭designed‬ ‭using‬ ‭the‬ ‭CAD‬ ‭software,‬ ‭the‬ ‭o ther‬ ‭processes‬ ‭are‬ ‭automatic.‬ ‭The‬
‭following are involved:‬
‭(a)‬ ‭Conversion of data into a set of machine tool instructions;‬
‭(b)‬ ‭Operation of the CAM system:‬
‭a.‬ ‭Selection of tools, e.g. cutter, drills, etc.‬
‭b.‬ ‭Selection of speed e.g. for drills‬
‭c.‬ ‭Movement of the tool to machine the part being manufactured.‬

‭CLOSED-CIRCUIT TELEVISION (CCTV)‬


‭-‬ C ‭ losed-circuit‬‭television‬‭is‬‭the‬‭use‬‭o f‬‭o ne‬‭o r‬‭more‬‭video‬‭cameras‬‭to‬‭produce‬‭video‬
‭signals‬‭that‬‭are‬‭not‬‭broadcast,‬‭but‬‭displayed‬‭o n‬‭a‬‭monitor‬‭screen.‬‭The‬‭images‬‭may‬
‭be recorded.‬
‭-‬ ‭The‬ ‭camera‬ ‭may‬ ‭be‬ ‭remotely‬ ‭controlled‬ ‭by‬ ‭an‬ ‭o perator‬ ‭o r‬ ‭by‬ ‭a‬ ‭computer‬ ‭that‬
‭receives data from sensors signalling an event of interest in a particular area.‬
‭-‬ ‭The‬‭computer’s‬‭software‬‭could‬‭react‬‭by‬‭tilting‬‭and‬‭zooming‬‭the‬‭CCTV‬‭camera‬‭o nto‬
‭the area protected by the sensor and starting to record the camera’s video stream.‬
‭-‬ ‭Mostly‬‭used‬‭in‬‭shops‬‭to‬‭record‬‭all‬‭transactions,‬‭e.g.‬‭capturing‬‭video‬‭o f‬‭customers.‬
‭It can be easy to identify shoplifters and thus reducing theft of goods in shops.‬
‭-‬ ‭CCTV‬ ‭is‬ ‭now‬‭being‬‭used‬‭even‬‭to‬‭record‬‭street‬‭events.‬‭This‬‭has‬‭been‬‭triggered‬‭by‬
‭rise in terrorist activities especially in Western countries and the United States.‬

‭COMPUTER NETWORKS‬
‭ efinition of Terms‬
D
‭a.‬ ‭Network‬‭:‬ ‭A‬ ‭connection‬ ‭o f‬ ‭computers‬‭for‬‭them‬‭to‬‭share‬‭data,‬‭files‬‭and‬‭resources‬
‭like a printer.‬
‭b.‬ ‭Data‬ ‭communication:‬ ‭The‬ ‭process‬ ‭o f‬ ‭transferring‬ ‭data‬ ‭through‬ ‭networked‬
‭computers‬

‭ dvantages of Networking‬
A
‭-‬ ‭Expensive peripherals like printers and scanners can be shared between users.‬
‭-‬ ‭Messages can be sent easily and faster between users whether on WAN or LAN.‬
‭-‬ ‭Avoids‬ ‭duplication‬ ‭o f‬ ‭information‬ ‭as‬ ‭users‬ ‭can‬ ‭access‬ ‭the‬ ‭same‬ ‭file‬ ‭o n‬ ‭the‬
‭network.‬
‭-‬ ‭Network‬‭software‬‭can‬‭be‬‭purchased‬‭cheaply‬‭than‬‭buying‬‭individual‬‭packages‬‭for‬
‭each computer.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭53‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ I‭ t is possible to access data or programs from any terminal or workstation.‬
‭-‬ ‭Data‬ ‭and‬ ‭programs‬ ‭can‬ ‭be‬ ‭stored‬ ‭centrally‬ ‭making‬ ‭it‬ ‭easier‬ ‭to‬ ‭maintain‬ ‭and‬
‭backup.‬
-‭ ‬ ‭Users can be easily prevented from accessing files not intended for them.‬
‭-‬ ‭Allows sharing of files, software and data held in computers.‬
‭-‬ ‭Allows emails to be send between users.‬

‭ isadvantages of Networking‬
D
‭-‬ ‭Sophisticated equipment is needed, which may be expensive to buy.‬
‭-‬ ‭Security of data can be a problem due to hacking.‬
‭-‬ ‭Wiring‬ ‭can‬ ‭be‬ ‭expensive‬ ‭both‬ ‭to‬ ‭buy‬ ‭and‬ ‭to‬ ‭install;‬ ‭wiring‬ ‭can‬ ‭be‬ ‭sunk‬ ‭o n‬ ‭the‬
‭ground to avoid trailing cables.‬
‭-‬ ‭If a server breaks down, the whole network becomes unusable.‬
‭-‬ ‭Networks‬ ‭need‬ ‭experienced‬ ‭network‬ ‭managers,‬ ‭who‬ ‭will‬ ‭be‬ ‭highly‬ ‭paid‬ ‭to‬‭keep‬
‭the network running.‬

‭ ypes of Networks‬
T
‭-‬ ‭Computer‬ ‭networks‬ ‭are‬ ‭grouped‬ ‭into‬ ‭Local‬ ‭Area‬ ‭Networks‬ ‭(LAN)‬ ‭and‬ ‭Wide‬
‭Area Networks (WAN).‬
‭-‬ ‭However‬ ‭we‬ ‭also‬ ‭have‬ ‭WLAN‬ ‭(Wireless‬ ‭Local‬ ‭Area‬ ‭Networks)‬‭,‬ ‭MAN‬
‭(Metropolitan‬ ‭Area‬ ‭Networks)‬ ‭and‬ ‭PAN‬‭(Personal‬‭Area‬‭Networks)‬‭;‬‭and‬‭these‬
‭are described below.‬

‭ . Local Area Networks (LAN)‬


1
‭This‬ ‭is‬ ‭the‬ ‭connection‬ ‭o f‬ ‭computers‬ ‭over‬ ‭a‬ ‭very‬ ‭small‬ ‭geographical‬ ‭area,‬ ‭like‬ ‭in‬ ‭a‬
‭single‬‭room,‬‭for‬‭user‬‭to‬‭share‬‭files,‬‭data,‬‭software‬‭and‬‭hardware‬‭like‬‭printers.‬‭Other‬
‭LANs‬ ‭can‬ ‭link‬ ‭different‬ ‭departments‬ ‭(e.g.‬ ‭Sales,‬ ‭Accounts,‬ ‭Warehousing,‬ ‭Despatch,‬
‭etc)‬ ‭within‬ ‭an‬ ‭o rganisation’s‬ ‭complex.‬‭A‬‭LAN‬‭is‬‭usually‬‭owned‬‭by‬‭o ne‬‭o rganisation.‬
‭However,‬ ‭if‬ ‭an‬ ‭o rganisation‬ ‭uses‬ ‭internet‬ ‭service‬ ‭within‬ ‭its‬ ‭restricted‬ ‭private‬‭Local‬
‭Area Network, such a network is called an Intranet (private network).‬
‭NB‬‭:‬ ‭Intranet‬ ‭is‬ ‭a‬‭private‬‭o rganisation’s‬‭network‬‭that‬‭uses‬‭internet‬‭technologies‬‭for‬
‭the benefits of such an organisation.‬
‭Extranet‬‭:‬ ‭an‬ ‭extension‬ ‭o f‬ ‭the‬ ‭intranet‬ ‭giving‬ ‭authorized‬ ‭o utsiders‬
‭controlled/limited access to the intranet.‬

‭ equirements for a LAN Connection‬


R
‭A. Hardware Requirements‬
‭1.‬ ‭Host‬ ‭computer‬ ‭/‬ ‭Server:‬ ‭This‬ ‭is‬ ‭the‬ ‭main‬ ‭computer‬ ‭that‬ ‭control‬ ‭and‬ ‭manage‬
‭o ther computers on the network.‬
‭2.‬ ‭Terminals:‬ ‭These‬ ‭are‬ ‭computers‬ ‭that‬ ‭are‬ ‭o n‬ ‭the‬ ‭network‬ ‭and‬ ‭are‬ ‭linked‬ ‭to‬ ‭the‬
‭host‬ ‭computer.‬ ‭If‬ ‭the‬ ‭terminal‬ ‭has‬ ‭its‬ ‭own‬ ‭processing‬ ‭and‬ ‭storage‬ ‭capabilities,‬ ‭it‬‭is‬
‭called‬ ‭an‬ ‭intelligent‬ ‭terminal‬‭.‬ ‭However,‬ ‭if‬ ‭the‬ ‭terminal‬ ‭does‬ ‭not‬ ‭have‬ ‭its‬ ‭own‬
‭processing‬ ‭and‬‭storage‬‭facilities‬‭and‬‭relies‬‭o n‬‭the‬‭host‬‭computer‬‭for‬‭it‬‭to‬‭work,‬‭it‬‭is‬
‭called a‬‭dump terminal‬‭.‬
‭3.‬ ‭Network‬ ‭c ables:‬ ‭These‬ ‭act‬ ‭as‬ ‭pathway‬ ‭for‬ ‭data‬ ‭from‬ ‭o ne‬ ‭computer‬ ‭to‬ ‭another.‬
‭Cables can be coaxial, fibre optics, twisted pair, etc.‬
‭4.‬ ‭Hub:‬ ‭a‬ ‭device‬ ‭used‬ ‭as‬ ‭a‬ ‭connection‬ ‭point‬ ‭for‬ ‭devices‬‭and‬‭computers‬‭o n‬‭a‬‭Local‬
‭Area Network. Usually used when connecting computers to a star network.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭54‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ .‬ ‭Network‬ ‭c ards‬ ‭for‬ ‭each‬ ‭computer/terminal:‬ ‭-‬‭a‬‭device‬‭that‬‭identifies‬‭computers‬
5
‭to the network, where network cables are plugged on the computer‬

‭ B‬‭:‬‭A‬‭bridge‬‭can‬‭also‬‭be‬‭connected‬‭to‬‭link‬‭a‬‭Local‬‭Area‬‭Network‬‭to‬‭another‬‭network‬
N
‭and is‬‭an optional‬‭requirement.‬

‭ owever,‬ ‭some‬ ‭networks‬ ‭are‬ ‭now‬ ‭using‬ ‭wireless‬ ‭technology‬ ‭and‬ ‭these‬ ‭are‬ ‭called‬
H
‭Wireless‬‭Local‬‭Area‬‭Networks‬‭(WLAN).‬‭WLAN‬‭uses‬‭radio‬‭signals‬‭and‬‭therefore‬‭no‬
‭cabling is required.‬
‭The‬ ‭diagram‬ ‭below‬ ‭shows‬ ‭the‬‭structure‬‭o f‬‭a‬‭LAN‬‭that‬‭can‬‭be‬‭connected‬‭to‬‭another‬
‭network.‬

‭ oftware Requirements for A LAN Connection‬


S
‭a.‬ ‭Communication‬ ‭software‬‭like‬‭TCP/IP‬‭–‬‭Transmission‬‭Control‬‭Protocol‬‭Internet‬
‭Protocol.‬ ‭A‬ ‭protocol‬ ‭is‬ ‭a‬ ‭set‬ ‭o f‬ ‭rules‬ ‭followed‬ ‭by‬ ‭devices‬ ‭when‬ ‭they‬ ‭are‬
‭communicating.‬
‭b. Network operating system‬‭: manages the network and‬‭network devices‬

‭ . MAN (Metropolitan Area Network)‬


2
‭A‬‭network‬‭similar‬‭to‬‭a‬‭LAN,‬‭but‬‭usually‬‭extends‬‭to‬‭a‬‭larger‬‭geographical‬‭area,‬‭usually‬
‭the‬‭whole‬‭city‬‭and‬‭is‬‭owned‬‭by‬‭a‬‭consortium‬‭o f‬‭users.‬‭The‬‭network‬‭is‬‭o nly‬‭accessed‬
‭by‬ ‭a‬ ‭group‬ ‭o f‬ ‭users‬ ‭as‬ ‭defined‬ ‭by‬ ‭the‬ ‭o rganisation,‬ ‭e.g‬ ‭students‬ ‭o f‬ ‭a‬ ‭certain‬
‭university.‬ ‭It‬ ‭enables‬ ‭users‬ ‭to‬ ‭do‬ ‭researches,‬ ‭share‬ ‭files,‬ ‭libraries,‬ ‭local‬ ‭email‬ ‭and‬
‭video conferencing.‬

‭ . Wide Area Network (WAN)‬


3
‭Refers‬ ‭to‬ ‭the‬ ‭connection‬ ‭o f‬ ‭computers‬‭over‬‭a‬‭large‬‭geographical‬‭area,‬‭o ften‬‭over‬‭1‬
‭km,‬ ‭e.g.‬ ‭covering‬ ‭the‬ ‭whole‬ ‭district,‬ ‭province‬ ‭o r‬ ‭different‬‭countries.‬‭Internet‬‭is‬‭also‬
‭part of WAN. WANs can also be wireless.‬

‭ ardware Requirements for a WAN‬


H
‭a.‬ ‭Modem‬ ‭(Modulator‬ ‭Demodulator):-‬ ‭a‬ ‭device‬‭that‬‭converts‬‭analogue‬‭data‬‭from‬
‭the‬ ‭telephone‬ ‭line‬ ‭to‬ ‭digital‬ ‭data‬ ‭that‬ ‭can‬ ‭be‬‭understood‬‭by‬‭the‬‭computer‬‭and‬‭vice‬
‭versa;‬ ‭o ften‬ ‭for‬ ‭internet‬ ‭connection‬ ‭using‬ ‭a‬ ‭telephone‬ ‭line.‬ ‭They‬ ‭can‬ ‭be‬ ‭used‬ ‭as‬
‭gateway for connecting LAN to a WAN‬
‭b.‬ ‭Communication‬ ‭link‬‭:‬ ‭Acts‬ ‭as‬ ‭a‬ ‭transmission‬ ‭media‬ ‭for‬‭data,‬‭e.g.‬‭telephone‬‭line,‬
‭satellite transmission, etc.‬
‭c .‬ ‭Network‬ ‭c ards‬ ‭for‬ ‭each‬ ‭computer:-‬ ‭a‬ ‭device‬ ‭that‬ ‭identifies‬ ‭computers‬ ‭to‬ ‭the‬
‭network, where network cables are plugged on the computer‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭55‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ oftware Requirements for a WAN‬


S
‭i.‬ ‭Communication‬ ‭Software‬ ‭like‬ ‭TCP/IP‬ ‭–‬‭Transmission‬‭Control‬‭Protocol‬‭Internet‬
‭Protocol.‬
‭ii.‬‭Web‬‭Browser:‬‭refers‬‭to‬‭software‬‭used‬‭for‬‭o pening‬‭web‬‭pages‬‭o n‬‭the‬‭internet,‬‭for‬
‭example‬ ‭Microsoft‬ ‭Internet‬ ‭Explorer,‬ ‭Netscape‬ ‭Navigator,‬ ‭Mozilla‬ ‭Firefox,‬ ‭etc.‬ ‭it‬ ‭is‬
‭used by users to hook to the internet.‬
‭iii. Network operating system‬‭: manages the network‬‭and network devices.‬

‭ . PAN (Personal Area Network)‬


4
‭This‬ ‭a‬ ‭very‬ ‭much‬ ‭limited‬ ‭network,‬ ‭usually‬ ‭used‬ ‭by‬ ‭o ne‬ ‭person.‬ ‭This‬ ‭can‬ ‭also‬ ‭be‬
‭Wireless‬ ‭Personal‬ ‭Area‬ ‭Network‬ ‭(WPAN)‬‭,‬ ‭for‬ ‭example‬ ‭connection‬ ‭through‬
‭Bluetooth. Bluetooth connects different devices, usually over a short distance.‬

‭ ‬ ‭PAN‬ ‭enables‬ ‭user‬ ‭to‬ ‭transfer‬ ‭files‬ ‭from‬ ‭a‬ ‭laptop‬ ‭to‬ ‭a‬ ‭PDA,‬ ‭camera‬ ‭o r‬ ‭Personal‬
A
‭Computer.‬

‭ etwork Topology (Configuration)‬


N
‭This‬ ‭refers‬‭to‬‭the‬‭shape/configuration‬‭o f‬‭the‬‭network.‬‭Common‬‭network‬‭topologies‬
‭are Ring, bus, star and mesh network topologies.‬

‭ . Ring Network:‬
1
‭-‬ ‭Computers‬ ‭are‬ ‭connected‬ ‭together‬ ‭to‬ ‭form‬ ‭a‬ ‭circle‬ ‭and‬ ‭uses‬ ‭a‬ ‭token‬ ‭when‬
‭transferring data.‬
‭-‬ ‭Data/information travels in one direction only.‬
‭-‬ ‭Information moves around the ring in sequence from its source to its destination.‬
‭-‬ ‭As‬‭data‬‭passes‬‭from‬‭o ne‬‭computer‬‭to‬‭another‬‭in‬‭the‬‭ring,‬‭each‬‭computer‬‭removes‬
‭any data relevant to itself and adds any data it wishes to send.‬
‭-‬ ‭The diagram below illustrates the physical configuration of a ring network:‬

‭ dvantages of Ring Network‬


A
‭-‬ ‭Data processing is faster as each computer processes its own processor.‬
‭-‬ ‭Has very high data transfer rates.‬
‭-‬ ‭Uses a token to avoid data collision or loss‬
‭-‬ ‭it is possible to create large networks using this topology‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭56‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ ‭If‬ ‭o ne‬ ‭computer‬ ‭breaks‬ ‭down,‬ ‭o thers‬‭will‬‭remain‬‭working‬‭as‬‭they‬‭have‬‭their‬‭own‬
‭processors and storage facilities.‬
‭-‬ ‭Performs better than star network when traffic is very heavy.‬

‭ isadvantages of Ring Network‬


D
‭-‬ ‭If one computer breaks down, the whole network is disrupted.‬
‭-‬ ‭a faulty connection between two stations can cause network failure‬
‭-‬ ‭Its‬‭requirements‬‭are‬‭expensive,‬‭that‬‭is‬‭buying‬‭several‬‭computers‬‭with‬‭processors‬
‭and storage facilities.‬
‭-‬ ‭It is difficult to link the computers together.‬
‭-‬ ‭Difficult to add another computer without disrupting the networking.‬
‭-‬ ‭Only‬‭the‬‭computer‬‭with‬‭the‬‭token‬‭is‬‭allowed‬‭to‬‭send‬‭data‬‭at‬‭a‬‭given‬‭time.‬‭One‬‭may‬
‭not send data when another node (computer) is still sending its own data.‬
‭-‬ ‭System‬‭is‬‭less‬‭secure‬‭as‬‭token‬‭together‬‭with‬‭data‬‭has‬‭to‬‭pass‬‭through‬‭o ther‬‭nodes‬
‭that do not concern it.‬

‭ . Star Network:‬
2
‭Computers form a star shape with host computer at the centre.‬
‭The Server (host computer) manages all other computers/terminals on the network.‬
‭If‬ ‭the‬ ‭terminals‬ ‭are‬ ‭not‬ ‭intelligent,‬ ‭they‬ ‭have‬ ‭to‬ ‭rely‬ ‭o n‬ ‭the‬ ‭host‬ ‭computer‬ ‭for‬
‭everything.‬
‭This network is as shown below:‬

‭ dvantages of Star Network‬


A
‭-‬ ‭If one terminal breaks down, the network is not disrupted.‬
‭-‬ ‭It‬ ‭is‬ ‭cheap‬ ‭in‬ ‭terms‬ ‭o f‬ ‭requirements‬ ‭since‬ ‭o nly‬ ‭the‬ ‭host‬ ‭computer‬ ‭can‬ ‭have‬ ‭a‬
‭processor and storage facility.‬
‭-‬ ‭It is very easy to install.‬
‭-‬ ‭Management of data is easier as this is done centrally.‬
‭-‬ ‭It is very fast to process data.‬
‭-‬ ‭Easier to add new workstation without disrupting the network.‬
‭-‬ ‭No‬ ‭problem‬ ‭o f‬ ‭collision‬ ‭o f‬ ‭data‬ ‭since‬ ‭each‬ ‭terminal‬ ‭has‬‭its‬‭own‬‭cable‬‭to‬‭the‬‭host‬
‭computer.‬
‭-‬ ‭Gives consistent performance even when the network is heavily utilised.‬
‭-‬ ‭More secure than other network topologies‬
‭-‬ ‭it is easier to identify faults using this type of topology‬
‭- It is easy to expand this type of network‬
‭-‬ ‭If one terminal breaks down, others will remain working.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭57‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ isadvantages of a Star Network‬
D
‭-‬ ‭If the host computer breaks down, the whole network will be disrupted.‬
‭-‬ ‭If‬‭the‬‭host‬‭computer‬‭is‬‭down,‬‭all‬‭the‬‭terminals‬‭will‬‭not‬‭work‬‭as‬‭they‬‭depend‬‭o n‬‭the‬
‭host for processing and storage.‬
‭-‬ ‭It requires a lot of cabling, which might be expensive.‬
‭-‬ ‭Can be slower if overloaded‬

‭ . Mesh Network‬
3
‭-‬ ‭A‬ ‭network‬ ‭in‬ ‭which‬ ‭each‬ ‭computer‬ ‭serves‬ ‭as‬ ‭a‬ ‭relay‬ ‭point‬ ‭for‬ ‭directly‬ ‭sending‬
‭information to any other computer on the network.‬
‭-‬ ‭No‬‭central‬‭device‬‭oversees‬‭a‬‭mesh‬‭network,‬‭and‬‭no‬‭set‬‭route‬‭is‬‭used‬‭to‬‭pass‬‭data‬
‭back and forth between computers.‬
‭-‬ ‭Thus,‬ ‭if‬ ‭any‬ ‭o ne‬ ‭computer‬ ‭is‬‭damaged‬‭o r‬‭temporarily‬‭unavailable,‬‭information‬‭is‬
‭dynamically rerouted to other computers—a process known as‬‭self-healing‬

‭ dvantages of Mesh Network‬


A
‭-‬ ‭If one computer breaks down, others will remain functional.‬
‭-‬ ‭If one computer breaks down, the network is not disturbed.‬
‭-‬ ‭Computers have their own storage and processing capabilities.‬

‭ isadvantages of Mesh Network‬


D
‭-‬ ‭Expensive to buy computers with their storage and processing facilities.‬
‭-‬ ‭Too much cabling is involved, which may be expensive.‬

‭ . Bus (Linear/Multi-drop) Network:‬


4
‭Computers‬ ‭are‬ ‭connected‬ ‭together‬ ‭through‬ ‭o ne‬ ‭main‬ ‭cable‬ ‭and‬ ‭all‬ ‭computers‬ ‭all‬
‭signals transmitted by any computer connected to the network‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭58‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ efinition of Terms‬
D
‭(a)‬‭Bus/Backbone‬‭:‬‭the‬‭dedicated‬‭and‬‭main‬‭cable‬‭that‬‭connects‬‭all‬‭workstations‬‭and‬
‭o ther computer devices like printers.‬
‭(b)‬‭Nodes‬‭: these are connection points for workstations‬‭and the bus.‬
‭(c)‬ ‭Terminator‬‭:‬ ‭devices‬ ‭that‬ ‭prevent‬ ‭data‬ ‭in‬ ‭the‬ ‭bus‬ ‭from‬ ‭bouncing‬ ‭back,‬ ‭causing‬
‭noise and prevents data from getting lost.‬

‭ dvantages of Bus network‬


A
‭-‬ ‭If one workstation breaks down, others will remain functional.‬
‭-‬ ‭If one workstation breaks down, the network remains working.‬
‭-‬ ‭All computers have processing and storage capabilities.‬
‭-‬ ‭It is cheap to install due to less cabling.‬
‭-‬ ‭Easy to add workstation without disrupting the network.‬
‭-‬ ‭Requires less cabling than a‬‭star‬‭network.‬
‭-‬ ‭Less expensive network than the other systems‬

‭Disadvantages of Bus Network‬


‭-‬ ‭Computers‬ ‭cannot‬ ‭send‬ ‭data‬ ‭at‬ ‭the‬ ‭same‬ ‭time‬ ‭nor‬ ‭while‬ ‭there‬ ‭is‬ ‭data‬ ‭being‬
‭transferred in the bus.‬
‭-‬ ‭Can cause collision of data during transmission.‬
‭-‬ ‭It is slow in transferring data.‬
‭-‬ ‭Its‬‭requirements‬‭are‬‭expensive,‬‭that‬‭is‬‭computers‬‭with‬‭their‬‭own‬‭processors‬‭and‬
‭storage facilities.‬
‭-‬ ‭The system will be down if the main cable (bus) is disrupted at any point.‬
‭-‬ ‭Less secure.‬
‭-‬ ‭Performance worsens as new stations added‬

‭ B:‬‭Point‬‭–‬‭to-Point‬‭Connection‬‭:‬‭Point-to-point‬‭topology‬‭is‬‭the‬‭simplest‬‭connection,‬
N
‭consisting of two connected computers.‬

‭PEER T0 PEER NETWORKS‬


‭-‬ ‭A peer-to-peer network is the one which does not have a server.‬
‭-‬ ‭All computers have an equal status.‬
‭-‬ ‭Each‬ ‭workstation‬ ‭can‬ ‭use‬ ‭resources‬ ‭from‬ ‭any‬ ‭o ther‬ ‭workstation‬ ‭and‬
‭communicate‬ ‭directly‬ ‭with‬ ‭every‬ ‭o ther‬‭node‬‭o n‬‭the‬‭network‬‭without‬‭using‬‭a‬
‭server.‬
‭-‬ ‭Used when users do their own work and share data.‬
‭-‬ ‭Storage facilities are distributed throughout the network‬
‭-‬ ‭It can be difficult to remember which files are located in which computer‬
‭-‬ ‭Each computer has its own software‬
‭-‬ ‭Less expensive‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭59‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ ‭Less difficult to administer‬
‭-‬ ‭Appropriate for small businesses‬
‭-‬ ‭Security is not centralised‬
‭-‬ ‭Backup is a responsibility of individual computer user‬
‭-‬ ‭Cheap to use‬
‭-‬ ‭No need for special network operating system‬
‭ iagram:‬
D

‭Server based Networks‬


‭-‬

‭ ETWORK PROTOCOLS‬
N
‭A‬ ‭protocol‬ ‭is‬ ‭a‬ ‭set‬ ‭o f‬ ‭rules‬ ‭that‬ ‭governs‬ ‭how‬ ‭communication‬ ‭between‬ ‭two‬‭devices‬
‭will occur. Such devices might be computers themselves, between modems.‬
‭A‬ ‭network‬ ‭communication‬ ‭protocol:‬ ‭a‬ ‭standard‬ ‭method‬ ‭for‬ ‭transmitting‬ ‭data‬ ‭from‬
‭o ne‬‭computer‬‭to‬‭another‬‭across‬‭a‬‭network.‬‭Some‬‭o f‬‭the‬‭protocols‬‭that‬‭we‬‭are‬‭going‬
‭to look at are:‬
‭i.‬ ‭TCP/IP (Transmission Control Protocol Internet Protocol)‬
‭TCP‬‭: It ensures that data is transmitted accurately‬
‭IP‬‭:‬ ‭It‬ ‭ensures‬ ‭that‬ ‭data‬ ‭is‬ ‭transmitted‬ ‭to‬ ‭its‬ ‭correct‬ ‭address‬ ‭(IP‬ ‭address).‬
‭Every‬ ‭device‬ ‭o n‬ ‭the‬ ‭internet‬ ‭has‬ ‭its‬ ‭IP‬ ‭address.‬ ‭It‬ ‭also‬ ‭ensures‬ ‭that‬ ‭packets‬
‭are rearranged to the original message on arrival of their destination.‬
‭ii.‬ ‭HTTP (HyperText Transfer Protocol)‬
‭This‬ ‭is‬ ‭a‬ ‭protocol‬ ‭that‬ ‭defines‬ ‭the‬ ‭process‬ ‭o f‬ ‭identifying,‬ ‭requesting‬ ‭and‬
‭transferring‬ ‭multimedia‬ ‭web‬ ‭pages‬ ‭over‬ ‭the‬ ‭internet.‬ ‭It‬ ‭is‬ ‭used‬ ‭for‬
‭transferring‬‭data‬‭across‬‭the‬‭internet,‬‭usually‬‭between‬‭servers‬‭and‬‭computers‬
‭o n‬‭the‬‭internet.‬‭It‬‭is‬‭based‬‭o n‬‭the‬‭client‬‭–server‬‭relationship.‬‭It‬‭uses‬‭TCP/IP‬‭to‬
‭transmit data and messages‬
‭iii.‬ ‭FTP (File Transfer Protocol)‬
‭it‬‭is‬‭a‬‭protocol‬‭used‬‭to‬‭transfer‬‭data‬‭from‬‭o ne‬‭computer‬‭to‬‭another.‬‭It‬‭is‬‭o ften‬
‭used‬‭to‬‭download‬‭software‬‭from‬‭the‬‭internet,‬‭and‬‭it‬‭uses‬‭the‬‭TCP/IP‬‭protocol‬
‭in‬ ‭doing‬ ‭this.‬ ‭However,‬ ‭FTP‬ ‭has‬ ‭no‬ ‭security‬ ‭to‬ ‭data‬ ‭as‬ ‭the‬ ‭data‬ ‭is‬ ‭not‬
‭encrypted prior to its transmission.‬
‭iv.‬ ‭TELNET‬
‭This‬ ‭is‬ ‭a‬ ‭network‬ ‭protocol‬ ‭that‬ ‭allows‬ ‭a‬ ‭computer‬ ‭user‬ ‭to‬ ‭gain‬ ‭access‬ ‭to‬
‭another‬‭computer‬‭and‬‭use‬‭its‬‭software‬‭and‬‭data,‬‭usually‬‭o n‬‭a‬‭LAN‬‭and‬‭o n‬‭the‬
‭Internet.‬‭It‬‭allows‬‭users‬‭to‬‭access‬‭data‬‭stored‬‭o n‬‭servers‬‭from‬‭their‬‭terminals.‬
‭Telnet‬ ‭allows‬ ‭computers‬ ‭to‬‭connect‬‭to‬‭each‬‭o ther‬‭and‬‭allows‬‭sharing‬‭o f‬‭data‬
‭and files. Telnet has security problems especially on the internet.‬
‭v.‬ ‭VoIP (Voice Over Internet Protocol)‬
‭It‬ ‭is‬ ‭a‬ ‭method‬ ‭o f‬ ‭using‬ ‭the‬ ‭internet‬ ‭to‬ ‭make‬ ‭o rdinary‬ ‭voice‬ ‭telephone‬ ‭calls.‬
‭Thus‬‭it‬‭is‬‭a‬‭way‬‭o f‬‭having‬‭phone‬‭conversations‬‭using‬‭the‬‭internet‬‭as‬‭a‬‭way‬‭o f‬
‭communication.‬‭By‬‭VoIP,‬‭international‬‭and‬‭long‬‭distance‬‭calls‬‭are‬‭o f‬‭the‬‭same‬
‭price‬‭as‬‭local‬‭calls‬‭and‬‭sometimes‬‭are‬‭for‬‭free.‬‭However,‬‭the‬‭system‬‭does‬‭not‬
‭o ffer emergency calls. An example of VoIP is Skype.‬

‭SYSTEMS ANALYSIS AND DESIGN‬


S‭ ystems‬ ‭Analysis‬ ‭is‬ ‭the‬ ‭detailed‬ ‭investigating‬ ‭the‬ ‭current‬ ‭system‬ ‭to‬ ‭determine‬ ‭is‬
‭problems, requirements and the best way of solving the problems.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭60‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ystem‬‭:‬ ‭A‬ ‭groups‬‭o f‬‭elements‬‭working‬‭together‬‭to‬‭achieve‬‭a‬‭common‬‭goal.‬‭Systems‬
S
‭are of two types:‬
‭Physical system‬‭: refers to tangible systems like schools,‬‭firm, shop, etc‬
‭Conceptual‬‭systems‬‭:‬‭these‬‭exist‬‭in‬‭mind‬‭o r‬‭paper‬‭and‬‭cannot‬‭be‬‭touched.‬‭They‬‭just‬
‭represent a physical system.‬
‭This‬ ‭chapter‬ ‭is‬ ‭concerned‬ ‭with‬ ‭the‬ ‭development‬ ‭and‬ ‭maintenance‬ ‭o f‬ ‭system‬ ‭like‬
‭stock‬ ‭control,‬ ‭patient‬ ‭monitoring,‬ ‭banking‬ ‭and‬ ‭payroll‬ ‭which‬ ‭are‬ ‭part‬ ‭o f‬ ‭physical‬
‭systems.‬

‭ he systems analyst‬
T
‭This‬‭is‬‭a‬‭person‬‭who‬‭identifies‬‭problems‬‭o f‬‭the‬‭existing‬‭system‬‭and‬‭recommends‬‭the‬
‭best solution to such a problem. The duties of a systems analyst are:‬
‭●‬ ‭Identifies the problems of the current system.‬
‭●‬ ‭Liaises with system users and determine their requirements.‬
‭●‬ ‭Finds out facts important to the design of the new system.‬
‭●‬ ‭Determines‬ ‭the‬ ‭human‬ ‭and‬ ‭computer‬ ‭procedures‬ ‭that‬ ‭will‬ ‭make‬ ‭up‬ ‭the‬
‭system.‬
‭●‬ ‭Participates in the process of system implementation.‬

‭By performing such duties the systems analyst acts as:‬


‭i.‬ ‭A consultant‬‭: can be called or hired to identify problems‬‭in a system‬
‭ii.‬ ‭A‬ ‭supporting‬ ‭expert‬‭:‬ ‭draws‬ ‭together‬ ‭professional‬ ‭expertise‬ ‭concerning‬
‭computer hardware and software and their uses in business.‬
‭iii.‬‭An agent of change‬‭: bring new ideas into the organisation‬

‭Qualities of a systems analyst‬


‭●‬ ‭Must‬ ‭have‬ ‭good‬ ‭o ral‬ ‭and‬ ‭written‬ ‭communication‬ ‭skills‬ ‭for‬ ‭all‬ ‭managerial‬
‭levels of an organisation.‬
‭●‬ ‭Must be able to work as a team.‬
‭●‬ ‭Must be well educated, with at least a degree.‬
‭●‬ ‭Must be well experienced in computers and at top managerial levels.‬
‭●‬ ‭Must have good managerial skills.‬
‭●‬ ‭Must be a problem solver and see problems as challenges.‬
‭●‬ ‭Must be self-motivated. Must be well disciplined.‬
‭●‬ ‭Must be able to work under pressure and meet deadlines.‬

I‭ nitiation (Origination) Of Systems Analysis‬


‭Changes to a system can be triggered by many factors, some of which are:‬
‭i.‬ ‭System‬ ‭users‬‭:‬‭they‬‭may‬‭be‬‭dissatisfied‬‭with‬‭the‬‭current‬‭system‬‭since‬‭they‬‭are‬‭the‬
‭o nes‬ ‭who‬ ‭o perate‬ ‭it.‬ ‭They‬ ‭will‬ ‭the‬ ‭sent‬ ‭requests‬ ‭to‬ ‭have‬ ‭a‬ ‭new‬ ‭system‬ ‭o r‬ ‭some‬
‭modification to the existing one.‬
‭ii.‬‭Top‬‭management‬‭:‬‭they‬‭may‬‭issue‬‭directives‬‭in‬‭o rder‬‭to‬‭meet‬‭new‬‭o rganisational‬
‭o bjectives.‬ ‭It‬ ‭can‬ ‭also‬ ‭be‬ ‭due‬ ‭to‬ ‭change‬ ‭in‬ ‭management‬ ‭(new‬ ‭manager),‬ ‭new‬
‭requirements, etc.‬
‭iii.‬‭The‬‭need‬‭for‬‭improved‬‭operating‬‭efficiency‬‭:‬‭Errors‬‭in‬‭the‬‭existing‬‭systems‬‭may‬
‭be intolerable, especially to customers.‬
‭iv.‬ ‭Changes‬ ‭in‬‭technology‬‭:‬‭new‬‭hardware‬‭and‬‭software‬‭may‬‭force‬‭o rganisations‬‭to‬
‭change their ways of operation.‬
‭v.‬ ‭Change‬ ‭of‬ ‭government‬ ‭policies‬‭:‬ ‭new‬ ‭government‬ ‭laws‬ ‭and‬ ‭policies‬ ‭can‬ ‭force‬
‭o rganisations to change their systems‬
‭vi. The user can change his mind‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭61‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ystems Development Life Cycle (SDLC)‬
S
‭This‬‭refers‬‭to‬‭the‬‭stages‬‭through‬‭which‬‭a‬‭system‬‭develops‬‭from‬‭‘birth’‬‭to‬‭‘death’,‬‭i.e.‬
‭from‬ ‭the‬ ‭moment‬ ‭the‬ ‭system‬ ‭is‬ ‭incepted‬‭until‬‭it‬‭is‬‭modified‬‭o r‬‭replaced‬‭with‬‭a‬‭new‬
‭o ne.‬
‭Can also be referred to as the Waterfall Model‬
‭The stages, in their order, include:‬
‭●‬ ‭Problem identification,‬
‭●‬ ‭Fact Finding‬
‭●‬ ‭feasibility study,‬
‭●‬ ‭analysis,‬
‭●‬ ‭design,‬
‭●‬ ‭Development and testing‬
‭●‬ ‭Documentation and user training‬
‭●‬ ‭implementation,‬
‭●‬ ‭Evaluation/review/maintenance.‬

‭Below is a diagram that indicates the SDLC stages‬

‭Below is an explanation of each of the stages listed above:‬

‭ . Problem identification/Recognition/Definition/Realisation:‬
1
‭This is where the problems of the current system are stated.‬
‭These‬ ‭might‬ ‭have‬ ‭been‬‭realised‬‭by‬‭system‬‭users‬‭o r‬‭by‬‭managers.‬‭The‬‭system‬‭might‬
‭be producing wrong results.‬
‭This‬ ‭includes‬ ‭the‬ ‭general‬ ‭statement‬ ‭o f‬ ‭the‬ ‭problems‬ ‭being‬ ‭experienced‬ ‭by‬ ‭the‬
‭system.‬

‭2. Fact Finding/Data Collection/Investigation‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭62‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ his‬ ‭is‬‭the‬‭stage‬‭whereby‬‭the‬‭analyst‬‭collects‬‭data‬‭from‬‭users,‬‭management‬‭and‬‭the‬
T
‭stakeholders,‬ ‭about‬ ‭the‬ ‭current‬ ‭system.‬ ‭Each‬ ‭data‬ ‭collection‬ ‭procedure‬ ‭is‬
‭appropriate‬ ‭for‬ ‭a‬ ‭given‬ ‭situation,‬ ‭not‬ ‭in‬ ‭all‬ ‭cases.‬ ‭A‬ ‭number‬ ‭o f‬ ‭data‬ ‭collection‬
‭techniques‬ ‭are‬ ‭employed,‬ ‭including‬ ‭the‬ ‭following:‬ ‭Questionnaire,‬ ‭interview,‬ ‭Record‬
‭inspection and Observation.‬
‭Some automatic data collection procedures may be used also.‬

‭ ata Collection Procedures‬


D
‭Terms used in data gathering include:‬
‭a. Interviewer‬‭: The person who asks questions in order‬‭to solicit information‬
‭b.‬‭Interviewee‬‭(respondent):‬‭interviewee‬‭is‬‭a‬‭person‬‭who‬‭is‬‭asked‬‭questions‬‭and‬‭is‬
‭expected to give information to the interviewer.‬
‭c .‬ ‭Population‬‭:‬ ‭The‬ ‭average‬‭number‬‭o f‬‭people‬‭in‬‭an‬‭area‬‭where‬‭a‬‭research‬‭is‬‭to‬‭be‬
‭carried out.‬
‭d. Sample‬‭: Fraction of the population who actually‬‭take part in the research.‬

i‭ . Interview:‬
‭This‬‭refers‬‭to‬‭the‬‭face-to-face‬‭communication‬‭between‬‭two‬‭o r‬‭more‬‭people‬‭in‬‭o rder‬
‭to‬ ‭o btain‬ ‭information.‬ ‭Interviews‬ ‭can‬ ‭also‬ ‭be‬ ‭done‬ ‭over‬ ‭the‬ ‭phone‬ ‭but‬ ‭the‬ ‭most‬
‭common‬ ‭o nes‬ ‭are‬ ‭face‬ ‭to‬ ‭face.‬ ‭Interviews‬ ‭are‬ ‭done‬ ‭when‬ ‭you‬ ‭want‬ ‭to‬ ‭collect‬
‭information from a very small population sample.‬
‭Advantages of Interviews‬
‭●‬ ‭The researcher can ask for clarification on some points that may not be clear.‬
‭●‬ ‭Encourages good rapport between the researcher and the respondent.‬
‭●‬ ‭Non-verbal‬ ‭gestures‬ ‭like‬ ‭facial‬ ‭expressions‬ ‭can‬ ‭help‬ ‭the‬ ‭researcher‬ ‭to‬
‭determine if the respondent is telling the truth.‬
‭●‬ ‭Information‬ ‭can‬ ‭be‬ ‭collected‬ ‭even‬ ‭from‬ ‭the‬ ‭illiterate‬ ‭since‬ ‭the‬ ‭respondent’s‬
‭language could be used.‬
‭●‬ ‭First-hand information is collected.‬
‭●‬ ‭The researcher can probe to get more information.‬

‭Disadvantages of Interviews‬
‭●‬ ‭It is impossible to remain anonymous on the part of the interviewee.‬
‭●‬ ‭It is expensive since the researcher has to travel to the interview venue.‬
‭●‬ ‭It‬ ‭is‬ ‭time‬ ‭consuming‬ ‭as‬ ‭more‬ ‭time‬ ‭is‬ ‭spent‬ ‭travelling‬ ‭and‬ ‭carrying‬ ‭o ut‬ ‭the‬
‭interview.‬
‭●‬ ‭Good‬ ‭interview‬ ‭techniques‬ ‭are‬ ‭required‬ ‭as‬ ‭failure‬ ‭may‬ ‭lead‬ ‭to‬
‭disappointments.‬
‭●‬ ‭Biased information can be given since the respondent may not tell the truth.‬

‭ii. Record/Document inspection:‬


‭●‬ ‭A‬ ‭fact‬‭finding‬‭method‬‭which‬‭involves‬‭scrutinising‬‭system‬‭documents‬‭in‬‭o rder‬
‭to solicit information.‬

‭Record inspection has the following advantages:‬


‭●‬ ‭Accurate information is collected from system records.‬
‭●‬ ‭First-hand information is obtained‬

‭Disadvantages of record inspection‬


‭●‬ ‭It is time consuming to go through all system records.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭63‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ M ‭ anual‬ ‭files‬ ‭can‬ ‭be‬ ‭tiresome‬ ‭to‬ ‭go‬ ‭through‬ ‭and‬ ‭some‬ ‭o f‬ ‭the‬ ‭data‬ ‭may‬ ‭be‬
‭illegible.‬
‭●‬ ‭Confidential files are not given to the researcher‬

i‭ ii. Questionnaire:‬
‭A‬ ‭document‬ ‭with‬ ‭carefully‬ ‭crafted‬ ‭questions‬ ‭to‬ ‭be‬ ‭answered‬ ‭by‬ ‭the‬‭respondent‬‭by‬
‭filling‬ ‭o n‬ ‭the‬ ‭spaces‬ ‭provided.‬‭Questionnaires‬‭are‬‭used‬‭when‬‭collecting‬‭information‬
‭from‬‭a‬‭widely‬‭spaced‬‭population‬‭sample‬‭and‬‭when‬‭collecting‬‭information‬‭from‬‭many‬
‭people.‬ ‭A‬ ‭questionnaire‬ ‭contains‬ ‭o pen-ended‬ ‭and‬ ‭closed‬ ‭questions.‬ ‭Open-ended‬
‭questions‬ ‭are‬ ‭gap‬ ‭filling‬ ‭questions‬ ‭which‬ ‭require‬ ‭the‬ ‭respondent‬ ‭to‬ ‭express‬‭his‬‭o r‬
‭her‬ ‭own‬ ‭view.‬ ‭Closed‬ ‭questions‬ ‭are‬ ‭guided‬ ‭questions‬ ‭where‬ ‭the‬ ‭respondent‬ ‭just‬
‭chooses‬ ‭Yes‬ ‭o r‬ ‭No,‬ ‭True‬ ‭o r‬ ‭False,‬ ‭o r‬ ‭by‬ ‭just‬ ‭putting‬ ‭a‬ ‭tick‬ ‭o n‬ ‭given‬ ‭o ptions.‬
‭Questionnaires can be distributed personally or by post.‬

‭Advantages of questionnaires‬
‭●‬ ‭Questions are very simple and faster to answer.‬
‭●‬ ‭It saves time as questionnaires can be distributes and then collected later.‬
‭●‬ ‭Respondents can fill questionnaires at their own pace.‬
‭●‬ ‭Give‬‭guarantees‬‭confidential‬‭o f‬‭information,‬‭thereby‬‭encouraging‬‭respondents‬
‭to give accurate information.‬
‭●‬ ‭They are cheap to use when collecting data from a very large sample‬

‭Disadvantages of questionnaires‬
‭●‬ ‭Some questions are left blank.‬
‭●‬ ‭Some questionnaires may not be returned at all.‬
‭●‬ ‭Biased information can be collected as people may lie.‬
‭●‬ ‭Respondents usually do not fill the correct information.‬
‭●‬ ‭It is difficult to analyse information collect using questionnaires.‬
‭●‬ ‭They are expensive to use if the postal system is used.‬
‭●‬ ‭Abusive information can be filled by respondents.‬
‭●‬ ‭It is difficult to prepare a good questionnaire‬

i‭ v. Observations:‬
‭It‬‭is‬‭a‬‭fact‬‭finding‬‭method‬‭that‬‭involves‬‭viewing‬‭the‬‭actual‬‭system‬‭in‬‭o peration‬‭by‬‭the‬
‭researcher.‬ ‭The‬ ‭researcher‬ ‭can‬ ‭even‬ ‭take‬ ‭part‬ ‭in‬ ‭o perating‬ ‭the‬ ‭system.‬ ‭It‬ ‭is‬ ‭used‬
‭when the researcher wants to see for himself how the system operates.‬
‭Advantages of observations‬
‭●‬ ‭First-hand information is collected.‬
‭●‬ ‭Accurate information can be obtained.‬
‭●‬ ‭Areas of interest can be observed.‬
‭●‬ ‭The‬ ‭researcher‬ ‭can‬ ‭take‬ ‭part‬ ‭in‬‭o perating‬‭the‬‭system‬‭thereby‬‭getting‬‭insight‬
‭o n how the system operates.‬
‭●‬ ‭the analyst obtains reliable data‬
‭●‬ ‭it is possible to see exactly what is being done‬

‭Disadvantages of observations‬
‭●‬ ‭People‬ ‭work‬ ‭differently‬ ‭if‬ ‭they‬ ‭feel‬ ‭that‬ ‭they‬ ‭are‬ ‭being‬ ‭o bserved,‬ ‭therefore‬
‭inaccurate information can be collected.‬
‭●‬ ‭The researcher may not understand some of the activities being observed.‬
‭●‬ ‭It is time consuming to collect the required information.‬
‭●‬ ‭The researcher may interrupt some of the activities being done.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭64‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ i‭f‬ ‭workers‬ ‭perform‬ ‭tasks‬ ‭that‬ ‭violate‬ ‭standard‬ ‭procedures,‬ ‭they‬ ‭may‬‭not‬‭do‬
‭this when being watched!!‬

‭ . Feasibility Study:‬
3
‭It‬ ‭involves‬ ‭an‬ ‭evaluation‬ ‭o f‬ ‭proposals‬‭to‬‭determine‬‭if‬‭it‬‭possible‬‭to‬‭construct‬‭a‬‭new‬
‭system‬ ‭o r‬ ‭just‬ ‭modification‬ ‭o f‬ ‭the‬ ‭existing‬ ‭o ne.‬ ‭Feasibility‬ ‭can‬ ‭be‬ ‭measured‬ ‭by‬
‭making the following considerations:‬
‭Economic‬ ‭feasibility:‬ ‭determining‬ ‭whether‬ ‭the‬ ‭benefits‬ ‭o f‬ ‭the‬ ‭new‬ ‭system‬ ‭will‬
‭o ut-weigh‬ ‭the‬ ‭estimated‬ ‭cost‬ ‭involved‬ ‭in‬ ‭developing,‬ ‭purchasing,‬ ‭assembling‬
‭requirements,‬ ‭installing‬ ‭and‬ ‭maintenance‬ ‭o f‬ ‭the‬ ‭new‬ ‭system.‬ ‭The‬ ‭cost-benefits‬
‭analysis‬‭is‬‭carried‬‭o ut.‬‭Benefits‬‭can‬‭be‬‭tangible‬‭and‬‭quantifiable,‬‭e.g.‬‭profits‬‭in‬‭terms‬
‭o f‬ ‭monetary‬ ‭values,‬ ‭fewer‬ ‭processing‬ ‭errors,‬ ‭increased‬ ‭production,‬ ‭increased‬
‭response‬ ‭time,‬ ‭etc.‬ ‭Other‬ ‭benefits‬ ‭are‬ ‭intangible,‬ ‭e.g.‬ ‭improved‬ ‭customer‬ ‭goodwill,‬
‭employee moral, job satisfaction, better service to the community, etc.‬
‭Technical‬‭feasibility‬‭:‬‭determines‬‭if‬‭the‬‭o rganisation‬‭can‬‭o btain‬‭software,‬‭equipment‬
‭and personnel to develop, install and operate the system and even to maintain it.‬
‭Social‬ ‭feasibility‬‭:‬ ‭a‬ ‭measure‬ ‭o f‬ ‭the‬ ‭system’s‬ ‭acceptance‬ ‭by‬ ‭the‬ ‭general‬‭public;‬‭if‬‭it‬
‭will meet the norms and values of the society.‬
‭Legal‬ ‭feasibility‬‭:‬ ‭This‬ ‭is‬ ‭determining‬ ‭if‬ ‭the‬ ‭system‬ ‭can‬ ‭conform‬ ‭to‬ ‭the‬ ‭laws‬ ‭and‬
‭statutes‬‭o f‬‭the‬‭country.‬‭This‬‭is‬‭done‬‭by‬‭considering‬‭government‬‭legislation,‬‭e.g.‬‭Data‬
‭processing system must comply with the local Data Protection Acts‬
‭Operational‬ ‭feasibility‬‭:‬ ‭determines‬ ‭whether‬ ‭the‬ ‭current‬ ‭work‬ ‭practices‬ ‭and‬
‭procedures‬ ‭are‬ ‭adequate‬ ‭to‬ ‭support‬ ‭the‬ ‭system,‬ ‭e.g.‬ ‭effects‬ ‭o n‬‭social‬‭lives‬‭o f‬‭those‬
‭affected by the system, can it work well with existing hardware, etc‬
‭Operational‬ ‭feasibility‬ ‭assessment‬ ‭focuses‬ ‭o n‬ ‭the‬ ‭degree‬ ‭to‬ ‭which‬ ‭the‬ ‭proposed‬
‭system‬ ‭fits‬ ‭in‬ ‭with‬ ‭the‬ ‭existing‬ ‭business‬ ‭environment‬ ‭and‬‭o bjectives‬‭with‬‭regard‬‭to‬
‭development‬ ‭schedule,‬ ‭delivery‬ ‭date,‬ ‭corporate‬ ‭culture,‬ ‭and‬ ‭existing‬ ‭business‬
‭processes‬

‭ fter‬ ‭carrying‬ ‭o ut‬ ‭the‬ ‭feasibility‬ ‭study,‬ ‭a‬ ‭feasibility‬ ‭study‬ ‭report‬ ‭must‬‭be‬‭produced‬
A
‭and it contains the following information:‬
‭-‬ ‭A brief description of the business.‬
‭-‬ ‭Advantages and problems of the existing system.‬
‭-‬ ‭Objectives of the new system.‬
‭-‬ ‭Evaluation of the alternative solutions.‬
‭-‬ ‭Development timetable.‬
‭-‬ ‭Management summary.‬
‭-‬ ‭Terms of reference.‬
‭-‬ ‭Proposed solution.‬

‭ . Analysis stage‬‭:‬
4
‭This‬ ‭is‬ ‭the‬ ‭in-depth‬ ‭study‬ ‭o f‬ ‭the‬ ‭system‬ ‭to‬ ‭determine‬ ‭how‬ ‭data‬ ‭flows‬ ‭within‬ ‭the‬
‭system.‬
‭Analysis tools used includes:‬
‭- Decision trees‬
‭- Decision tables‬
‭It‬ ‭involves‬‭use‬‭o f‬‭flowcharts,‬‭data‬‭flow‬‭diagrams,‬‭structure‬‭diagrams,‬‭decision‬‭trees,‬
‭and‬ ‭o thers,‬ ‭to‬ ‭describe‬ ‭the‬ ‭o perations‬ ‭o f‬ ‭the‬ ‭system‬ ‭in‬ ‭detail.‬ ‭The‬ ‭analysis‬ ‭stage‬
‭determines‬ ‭whether‬ ‭computerisation‬ ‭will‬ ‭take‬ ‭place‬ ‭o r‬ ‭not.‬ ‭The‬‭analysis‬‭stage‬‭also‬
‭specifies‬‭the‬‭hardware‬‭and‬‭software‬‭requirements‬‭o f‬‭the‬‭new/proposed‬‭system,‬‭the‬
‭advantages and disadvantages of the proposed solution, etc.‬
‭Analysis stage also involves identification of the following:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭65‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ A‭ lternative solutions: other solutions, not considering the chosen one‬
‭-‬ ‭Specification‬ ‭requirements:‬ ‭o ther‬ ‭system‬ ‭requirements‬ ‭like‬ ‭hardware,‬
‭software, personnel, etc‬
‭-‬ ‭Carrying‬ ‭o ut‬ ‭the‬ ‭Cost-benefit‬ ‭analysis:‬ ‭weighing‬ ‭o ut‬ ‭costs‬ ‭o f‬ ‭developing‬ ‭the‬
‭new system versus the benefits that will be realised.‬

‭ ataflow Diagrams‬
D
‭These‬ ‭are‬ ‭diagrams‬ ‭that‬ ‭show‬ ‭how‬ ‭data‬ ‭moves‬ ‭between‬ ‭external‬‭sources,‬‭through‬
‭processes‬ ‭and‬ ‭data‬ ‭stores‬ ‭o f‬ ‭a‬ ‭particular‬ ‭system.‬ ‭Dataflow‬ ‭diagrams‬ ‭use‬ ‭the‬
‭following symbols:‬

‭ . Design Stage:‬
5
‭This‬ ‭stage‬ ‭is‬ ‭concerned‬ ‭with‬ ‭the‬ ‭design‬ ‭o f‬ ‭the‬ ‭new‬ ‭computer‬ ‭based‬ ‭solution‬ ‭as‬
‭specified by the analysis stage. Design stage involves:‬
‭Input‬ ‭Design‬‭:‬ ‭includes‬ ‭designing‬ ‭o f‬ ‭data‬ ‭entry‬‭forms,‬‭input‬‭methods‬‭(e.g.‬‭by‬‭filling‬
‭forms, use of barcodes, etc) and the user interface.‬
‭Output‬‭Design‬‭:‬‭Includes‬‭design‬‭o f‬‭reports,‬‭data‬‭o utput‬‭formats,‬‭screen‬‭displays‬‭and‬
‭o ther printed documents like receipts, etc‬
‭File‬ ‭design‬‭:‬ ‭Involves‬ ‭designing‬ ‭tables/files,‬ ‭records‬ ‭and‬ ‭validation‬ ‭rules.‬ ‭It‬ ‭also‬
‭involves‬‭determining‬‭how‬‭data‬‭is‬‭to‬‭be‬‭stored‬‭and‬‭accessed,‬‭the‬‭media‬‭to‬‭be‬‭used‬‭for‬
‭storage‬ ‭and‬ ‭the‬ ‭mode‬ ‭o f‬ ‭file‬ ‭o rganisation.‬ ‭Fields‬ ‭in‬ ‭each‬ ‭files‬‭ca‬‭be‬‭designed,‬‭their‬
‭length and data type, e.g.‬

‭ ile Name‬‭: Student File‬


F
‭Storage Location‬‭: Hard Disk‬
‭Mode of Access‬‭: Direct/Random‬

‭File Structure‬‭:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭66‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭It also involves specifying how data is to be sorted and updated.‬

‭ rogram‬ ‭Design‬‭:‬ ‭Involves‬ ‭design‬ ‭o f‬ ‭systems‬ ‭flowcharts,‬ ‭structure‬ ‭diagrams,‬


P
‭dataflow‬‭diagrams,‬‭algorithms,‬‭etc.‬‭Selection‬‭of‬‭appropriate‬‭hardware‬‭:‬‭Specify‬‭the‬
‭input‬ ‭hardware,‬ ‭o utput‬ ‭hardware,‬ ‭processing‬ ‭hardware‬ ‭and‬ ‭speed,‬ ‭storage‬ ‭media,‬
‭RAM‬ ‭size,‬ ‭etc.‬ ‭Selection‬ ‭of‬ ‭appropriate‬ ‭software‬‭:‬ ‭specifying‬ ‭the‬‭type‬‭o f‬‭o perating‬
‭system,‬‭programming‬‭language‬‭o r‬‭database‬‭package‬‭and‬‭o ther‬‭application‬‭packages‬
‭to be used.‬
‭Design‬ ‭o f‬ ‭test‬ ‭plan‬ ‭and‬ ‭strategy,‬ ‭Design‬‭o f‬‭the‬‭user‬‭manual,‬‭Design‬‭o f‬‭the‬‭technical‬
‭documentation‬
‭In general, design stage involves the following:‬
‭✔‬ ‭design the data capture forms/input forms‬
‭✔‬ ‭design the screen layouts‬
‭✔‬ ‭design output forms and reports‬
‭✔‬ ‭produce systems flowcharts and/or pseudocode‬
‭✔‬ ‭select/design any validation rules that need to be used‬
‭✔‬ ‭design a testing strategy/plan‬
‭✔‬ ‭file structures/tables need to be designed/agreed‬
‭✔‬ ‭select/design the hardware requirements for the new system‬
‭✔‬ ‭select/design the software requirements‬
‭✔‬ ‭produce any algorithms or program flowcharts‬
‭✔‬ ‭select the most appropriate data verification method(s)‬
‭✔‬ ‭interface design(Command-line, GUI, form-based, menu-driven, etc‬

‭6. Development and Testing‬

‭ he‬ ‭computer‬ ‭environment‬ ‭is‬ ‭prepared,‬ ‭the‬ ‭programs‬ ‭to‬ ‭be‬ ‭written‬ ‭are‬ ‭done‬ ‭and‬
T
‭they are tested to determine if the run as expected.‬

‭ omputer‬‭environment‬‭being‬‭prepared:‬‭electrical‬‭wires,‬‭network‬‭cables‬‭are‬‭installed,‬
C
‭furniture, air conditioning are in place. The computers are installed and tested.‬
‭It‬‭also‬‭involves‬‭the‬‭construction‬‭and‬‭assembling‬‭o f‬‭the‬‭technical‬‭components‬‭that‬‭are‬
‭needed‬ ‭for‬ ‭the‬ ‭new‬ ‭system‬ ‭to‬ ‭o perate.‬ ‭This‬ ‭includes‬ ‭preparation‬ ‭o f‬ ‭the‬ ‭computer‬
‭room‬ ‭environment,‬ ‭coding‬ ‭o f‬ ‭the‬ ‭computer‬ ‭program‬ ‭using‬ ‭a‬‭specific‬‭programming‬
‭language, testing of the coded program,‬

‭Testing strategies‬
‭-‬ ‭standard‬ ‭(normal)‬ ‭data‬ ‭testing‬‭:‬ ‭testing‬ ‭o f‬ ‭data‬ ‭within‬ ‭the‬ ‭given‬ ‭range‬
‭(should be accepted)‬
‭-‬ ‭abnormal‬ ‭data‬ ‭testing‬‭:‬ ‭testing‬ ‭o f‬ ‭data‬ ‭o utside‬ ‭the‬ ‭given‬ ‭range‬ ‭(should‬ ‭be‬
‭rejected). It gives an error message when entered into the computer system.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭67‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ e‭ xtreme‬ ‭(boundary)‬ ‭data‬ ‭testing‬‭:‬ ‭testing‬ ‭o f‬ ‭the‬ ‭minimum‬ ‭and‬ ‭maximum‬
‭values in the given range (should be accepted)‬

‭ . DOCUMENTATION AND USER TRAINING‬


7
‭Documentation‬‭refers‬‭to‬‭the‬‭careful‬‭and‬‭disciplined‬‭recording‬‭o f‬‭information‬‭o n‬‭the‬
‭development,‬‭o peration‬‭and‬‭maintenance‬‭o f‬‭a‬‭system.‬‭Documentation‬‭is‬‭in‬‭two‬‭main‬
‭types: user documentation and technical documentation‬

(‭ a)‬ ‭User‬ ‭Documentation:‬ ‭It‬ ‭is‬ ‭a‬ ‭manual‬ ‭that‬ ‭guides‬ ‭system‬ ‭users‬‭o n‬‭how‬‭to‬‭load,‬
‭o perate,‬ ‭navigate‬ ‭and‬ ‭exit‬ ‭a‬ ‭program‬ ‭(system).‬ ‭User‬ ‭documentation‬ ‭contains‬ ‭the‬
‭following:‬
‭✔‬ ‭System/program name.‬
‭✔‬ ‭Storage location.‬
‭✔‬ ‭System password.‬
‭✔‬ ‭Instruction on how to install the program.‬
‭✔‬ ‭Instruction on how to operate the system: e.g.‬
‭o ‬ ‭How to quit the program‬
‭o ‬ ‭how to load/run the software‬
‭o ‬ ‭how to save files‬
‭o ‬ ‭how to do print outs‬
‭o ‬ ‭how to sort data‬
‭o ‬ ‭how to do a search‬
‭o ‬ ‭how to add, delete or amend records‬
‭o ‬ ‭print layouts (output)‬
‭o ‬ ‭screen layouts (input)‬
‭o ‬ ‭the purpose of the system/program/software package‬
‭o ‬ ‭error handling/meaning of errors‬
‭o ‬ ‭troubleshooting guide/help lines/FAQs‬
‭o ‬ ‭how to log in/log out‬

(‭ b)‬‭Technical‬‭Documentation:‬‭This‬‭is‬‭a‬‭manual‬‭for‬‭programmers‬‭which‬‭aid‬‭them‬‭in‬
‭modifying‬ ‭the‬ ‭system‬ ‭and‬ ‭in‬ ‭correcting‬‭program‬‭errors.‬‭The‬‭following‬‭are‬‭found‬‭in‬
‭technical documentation:‬
‭✔‬ ‭Algorithms of the program,‬
‭✔‬ ‭Program testing procedures and test data,‬
‭✔‬ ‭Sample of expected system results,‬
‭✔‬ ‭Program structure showing modules and their relationships,‬
‭✔‬ ‭System flowcharts,‬
‭✔‬ ‭Programming language used,‬
‭✔‬ ‭Program code,‬
‭✔‬ ‭program listings,‬
‭✔‬ ‭File structures.‬
‭✔‬ ‭Validation rules‬
‭✔‬ ‭Output formats‬
‭✔‬ ‭Bugs in the system‬
‭✔‬ ‭Hardware requirements‬
‭✔‬ ‭Software requirements‬

‭ ser Training:‬
U
‭Once‬‭a‬‭new‬‭system‬‭is‬‭put‬‭in‬‭place,‬‭existing‬‭employees‬‭are‬‭trained‬‭o n‬‭how‬‭to‬‭o perate‬
‭the‬‭new‬‭system,‬‭o therwise‬‭new‬‭employees‬‭are‬‭recruited.‬‭Users‬‭are‬‭trained‬‭o n‬‭how‬‭to‬
‭enter data, search records, edit fields, produce reports, handling errors, etc.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭68‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ser training can be in the following forms:‬
U
‭i.‬‭On‬‭the‬‭job‬‭training:‬‭Users‬‭are‬‭trained‬‭at‬‭their‬‭o rganisation‬‭by‬‭hired‬‭trainers.‬‭This‬
‭has the following advantages:‬
‭✔‬ ‭Learners practice with actual equipment and the environment of the job.‬
‭✔‬ ‭Learners can engage in productive practices while on training.‬
‭✔‬ ‭This is cheaper for the organisation.‬
‭✔‬ ‭Enough practice (experience) is gained on how to operate the system.‬
‭✔‬ ‭Production does not stop‬

‭Disadvantages of on the job training‬


‭✔‬ ‭Distractions occur in a noisy office.‬
‭✔‬ ‭Instructional methods are often poor.‬
‭✔‬ ‭The need to keep up output may lead to hasty teaching‬
‭✔‬ ‭Mistakes by learners can be disastrous for the system‬

i‭ i.‬‭Classroom‬‭training:‬‭Users‬‭are‬‭send‬‭to‬‭o ther‬‭colleges‬‭and‬‭institutions‬‭which‬‭o ffer‬


‭courses‬ ‭o n‬ ‭the‬ ‭subject‬ ‭matter.‬ ‭This‬ ‭could‬ ‭be‬ ‭expensive‬ ‭to‬ ‭o rganisations‬ ‭since‬
‭employees‬‭take‬‭study‬‭leave‬‭while‬‭being‬‭paid‬‭at‬‭the‬‭same‬‭time.‬‭Employees‬‭can‬‭also‬‭be‬
‭trained‬ ‭o n‬ ‭aspects‬ ‭that‬ ‭they‬ ‭will‬ ‭not‬ ‭apply‬ ‭when‬ ‭they‬ ‭finish‬ ‭the‬ ‭course.‬ ‭The‬ ‭gap‬
‭between what is learnt and what is needed at the job may be too wide.‬

‭Considerations when training users:‬


‭1.‬ ‭All‬ ‭staff‬ ‭need‬ ‭training‬ ‭that‬ ‭is‬ ‭relevant‬ ‭to‬ ‭their‬ ‭work‬ ‭using‬ ‭the‬ ‭computers.‬
‭However, others may find it difficult to learn the new system and may resist.‬
‭2.‬ ‭Age problem of trainees-older workers takes long to conceptualise concepts‬
‭3.‬ ‭Reluctance of employees to learn (use new system)‬
‭4.‬ ‭Computer based system means training on the computer‬
‭5.‬ ‭Regular updates means new training each time an upgrade is made‬
‭6.‬ ‭The type of training should be chosen carefully as it is important‬
‭7.‬ ‭Course type with trainer‬
‭o ‬ ‭It may restrict learning times‬
‭o ‬ ‭Can be intimidating to other employees‬
‭o ‬ ‭Difficult to satisfy all trainees’ demands‬
‭o ‬ ‭Gives human contact‬

‭ . Implementation/ Conversion (Installation/Changeover)‬


8
‭This‬‭also‬‭involves‬‭putting‬‭the‬‭new‬‭computer‬‭system‬‭into‬‭o peration,‬‭that‬‭is,‬‭changing‬
‭from‬‭the‬‭o ld‬‭system‬‭to‬‭the‬‭new‬‭o ne.‬ ‭It‬‭involves‬‭file‬‭conversion,‬‭which‬‭is‬‭the‬‭changing‬
‭o f‬‭o ld‬‭data‬‭files‬‭into‬‭the‬‭current‬‭format.‬‭Different‬‭changeover‬‭methods‬‭can‬‭be‬‭used,‬
‭and these include:‬

‭ .‬ ‭Parallel‬ ‭Run:‬ ‭This‬ ‭involves‬ ‭using‬ ‭o f‬ ‭both‬ ‭the‬ ‭o ld‬ ‭and‬ ‭new‬ ‭system‬ ‭concurrently‬
a
‭until‬ ‭the‬ ‭new‬ ‭system‬ ‭proves‬ ‭to‬ ‭be‬ ‭efficient.‬ ‭It‬ ‭involves‬ ‭o perating‬ ‭the‬ ‭new‬ ‭and‬ ‭o ld‬
‭systems‬ ‭simultaneously‬ ‭until‬ ‭management‬ ‭is‬ ‭confident‬ ‭that‬ ‭the‬ ‭new‬ ‭system‬ ‭will‬
‭perform‬ ‭satisfactorily.‬ ‭Other‬ ‭workers‬ ‭will‬ ‭be‬ ‭using‬ ‭the‬ ‭o ld‬ ‭system‬‭while‬‭o thers‬‭use‬
‭the old system but doing the same type of job.‬
‭Advantages of parallel run‬
‭✔‬ ‭Results for both systems are compared for accuracy and consistency.‬
‭✔‬ ‭If the new system develops problems, it will be easier to revert to the old one.‬
‭✔‬ ‭There‬‭is‬‭enough‬‭time‬‭given‬‭to‬‭determine‬‭if‬‭the‬‭new‬‭system‬‭produces‬‭expected‬
‭results.‬
‭✔‬ ‭Employees have enough time to familiarise with the new system.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭69‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Disadvantages of Parallel run‬


‭✔‬ ‭Running two systems at the same time is very expensive.‬
‭✔‬ ‭Running two systems simultaneously is demanding to employees.‬
‭✔‬ ‭It may be difficult to reach a decision when comparing the two systems.‬
‭✔‬ ‭There is duplication of tasks which in turn stresses employees‬

i‭ i.‬‭Abrupt‬‭(Direct)‬‭c hangeover:‬‭Involves‬‭stopping‬‭using‬‭the‬‭o ld‬‭system‬‭o n‬‭a‬‭certain‬


‭day‬‭and‬‭the‬‭new‬‭system‬‭takes‬‭over‬‭o n‬‭the‬‭next‬‭morning.‬‭This‬‭is‬‭suitable‬‭for‬‭control‬
‭systems like in chemical plants and for traffic lights.‬
‭Advantages of Direct Changeover‬
‭✔‬ ‭Reduces cost as of running two systems at the same time.‬
‭✔‬ ‭Faster and more efficient to implement.‬
‭✔‬ ‭There is minimum duplication of tasks.‬
‭✔‬ ‭Enough‬‭resources‬‭can‬‭be‬‭allocated‬‭to‬‭make‬‭sure‬‭that‬‭the‬‭new‬‭system‬‭o perates‬
‭successfully.‬

‭Disadvantages of Direct Changeover‬


‭✔‬ ‭It will be difficult to revert to the old system if the new system fails.‬

i‭ ii.‬ ‭Phased‬ ‭/‬ ‭Partial‬ ‭conversion:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭the‬ ‭o ld‬ ‭system‬ ‭is‬ ‭gradually‬
‭removed‬ ‭while‬ ‭the‬ ‭new‬ ‭system‬ ‭is‬ ‭gradually‬ ‭moved‬‭in‬‭at‬‭the‬‭same‬‭time.‬‭This‬‭can‬‭be‬
‭done‬‭by‬‭computerising‬‭o nly‬‭o ne‬‭department‬‭in‬‭an‬‭o rganisation‬‭this‬‭month,‬‭then‬‭the‬
‭next‬ ‭department‬ ‭in‬ ‭two‬ ‭months’‬ ‭time,‬ ‭and‬ ‭so‬ ‭o n‬ ‭until‬ ‭the‬ ‭whole‬ ‭system‬ ‭is‬
‭computerised.‬

‭Advantages of phased conversion‬


‭✔‬ ‭Avoids the risk of system failure.‬
‭✔‬ ‭Saves costs since the new system is applied in phases.‬
‭✔‬ ‭It‬‭could‬‭be‬‭easier‬‭to‬‭revert‬‭to‬‭the‬‭o ld‬‭system‬‭if‬‭the‬‭new‬‭system‬‭fails‬‭since‬‭o nly‬
‭o ne department will be affected.‬

‭Disadvantages of phased conversion‬


‭✔‬ ‭It‬‭could‬‭be‬‭very‬‭expensive‬‭since‬‭the‬‭o rganisation‬‭will‬‭be‬‭running‬‭two‬‭systems‬
‭but in different departments.‬

i‭ v.‬ ‭Pilot‬ ‭conversion:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭a‬ ‭program‬ ‭is‬ ‭tested‬ ‭in‬ ‭o ne‬ ‭o rganisation‬ ‭(or‬
‭department),‬ ‭and‬ ‭is‬ ‭applied‬ ‭to‬ ‭the‬ ‭whole‬ ‭o rganisation‬ ‭if‬ ‭it‬‭passes‬‭the‬‭pilot‬‭stage.‬‭It‬
‭serves‬ ‭as‬ ‭a‬ ‭model‬ ‭for‬ ‭o ther‬ ‭departments.‬ ‭A‬ ‭pilot‬ ‭program‬ ‭can‬ ‭then‬ ‭be‬ ‭applied‬ ‭in‬
‭phases, directly or using the parallel run method.‬

‭NB‬‭: before making system live, the following must‬‭have taken place:‬
‭-‬ ‭Production of user documentation and technical documentation‬
‭-‬ ‭Installation of hardware and software‬
‭-‬ ‭fully testing the new system‬
‭-‬ ‭training the staff to use the new system‬

‭ . Maintenance/review/evaluation Stage:‬
9
‭This‬ ‭stage‬ ‭is‬ ‭concerned‬ ‭with‬ ‭making‬ ‭upgrades‬ ‭and‬ ‭repairs‬ ‭to‬ ‭an‬ ‭already‬ ‭existing‬
‭system. Certain sections of the system will be modified with time.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭70‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ aintenance‬ ‭can‬ ‭be‬ ‭to‬ ‭Perfect‬ ‭the‬ ‭system,‬ ‭to‬ ‭Correct‬ ‭some‬ ‭errors‬ ‭o r‬ ‭to‬ ‭make‬ ‭it‬
M
‭adapt‬ ‭to‬ ‭changing‬ ‭needs,‬ ‭e.g‬ ‭change‬‭in‬‭government‬‭laws.‬‭Maintenance‬‭involves‬‭the‬
‭following:‬
‭●‬ ‭update‬ ‭hardware‬‭as‬‭new‬‭items‬‭come‬‭o n‬‭the‬‭market‬‭o r‬‭the‬‭company‬‭changes‬
‭in any way which requires new devices to be added/updated‬
‭●‬ ‭update‬ ‭software‬ ‭if‬ ‭necessary‬ ‭if‬ ‭company‬ ‭structure‬ ‭changes‬ ‭o r‬ ‭legislation‬ ‭is‬
‭introduced which affects how the company operates‬

‭Evaluation involves the following:‬


‭-‬ ‭compare final solution with the original requirement‬
‭-‬ ‭identify any limitations in the system‬
‭-‬ ‭identify any necessary improvements that need to be made‬
‭-‬ ‭evaluate the user’s responses to using the new system‬
‭-‬ ‭compare test results from new system with results from the old system‬
‭-‬ ‭compare performance of new system with performance of old system‬

‭Assessing the effectiveness of the new system:‬


‭-‬ ‭compare final solution with original requirements‬
‭-‬ ‭identify any limitations in the system‬
‭-‬ ‭identify any necessary improvements that need to be made‬
‭-‬ ‭evaluate user responses to using the new system‬
‭-‬ ‭compare test results from new system with results from old system‬
‭-‬ ‭compare performance of new system with performance of old system‬
‭-‬ ‭effectiveness of the hardware‬
‭-‬ ‭effectiveness of the software‬

‭ ystems Analysis Tools‬


S
‭(a) Gantt Charts‬
‭These‬ ‭are‬ ‭diagrams‬ ‭used‬ ‭to‬ ‭show‬ ‭the‬ ‭time‬ ‭taken‬ ‭for‬ ‭each‬ ‭stage‬ ‭o f‬ ‭the‬ ‭systems‬
‭development life cycle. Gant charts show the following information:‬
‭-‬ ‭all stages/tasks to be done during SDLC‬
‭-‬ ‭the critical path(s)‬
‭-‬ ‭number of days to do tasks‬
‭-‬ ‭progress on tasks as % complete‬
‭-‬ ‭progress versus expected time to do work‬
‭-‬ ‭how tasks are all linked together‬

(‭ b) Project Evaluation and Review Technique (PERT) Diagrams‬


‭PERT‬‭chart‬‭is‬‭a‬‭type‬‭o f‬‭chart‬‭used‬‭for‬‭project‬‭management;‬‭it‬‭represents‬‭each‬‭task‬‭o f‬
‭a‬ ‭project‬ ‭and‬ ‭how‬ ‭tasks‬ ‭are‬ ‭all‬ ‭linked‬ ‭together‬ ‭in‬‭sequence‬‭and‬‭task‬‭dependencies‬
‭(i.e. which tasks need to be complete before others can start).‬

(‭ C) System Flowcharts‬
‭A‬ ‭systems‬‭flowchart‬‭is‬‭a‬‭diagram‬‭used‬‭to‬‭show‬‭how‬‭all‬‭the‬‭components‬‭in‬‭a‬‭system‬
‭link‬ ‭together‬ ‭(e.g.‬‭input,‬‭storage,‬‭o utput,‬‭processing,‬‭etc.).‬‭They‬‭are‬‭very‬‭different‬‭to‬
‭normal‬‭flowcharts‬‭since‬‭they‬‭don’t‬‭go‬‭into‬‭detail‬‭o f‬‭how‬‭something‬‭is‬‭actually‬‭done‬‭–‬
‭they‬ ‭are‬ ‭a‬ ‭general‬ ‭overview.‬ ‭It‬ ‭shows‬‭the‬‭overview‬‭o f‬‭the‬‭system,‬‭tasks‬‭carried‬‭o ut‬
‭by‬ ‭the‬ ‭system,‬ ‭whether‬ ‭manual‬ ‭o r‬ ‭computer,‬ ‭devices,‬ ‭o utput‬ ‭media‬ ‭and‬ ‭files‬ ‭used,‬
‭etc.‬
‭Common symbols for designing systems flowcharts are as follows:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭71‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

*‭ ‬‭NB‬‭:‬ ‭Meanings‬ ‭o f‬ ‭these‬ ‭symbols‬ ‭are‬ ‭not‬ ‭universal‬ ‭and‬ ‭mean‬ ‭a‬ ‭different‬ ‭thing‬ ‭to‬
‭o thers. Some symbols are borrowed from program flowcharts.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭72‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ elow‬ ‭is‬ ‭a‬ ‭systems‬ ‭flowchart‬ ‭for‬ ‭a‬ B
B ‭ elow‬ ‭is‬ ‭a‬ ‭systems‬ ‭flowchart‬ ‭that‬ ‭is‬
‭payroll‬ ‭processing‬ ‭system‬ ‭that‬ ‭uses‬ ‭used‬‭to‬‭update‬‭a‬‭stock‬‭master‬‭file‬‭when‬
‭batch processing‬ ‭stock items are purchased.‬

‭Review Questions‬
‭1.‬ ‭(a)‬‭A‬‭systems‬‭analyst‬‭was‬‭brought‬‭in‬‭to‬‭computerise‬‭a‬‭paper‬‭-based‬‭car‬‭sales‬
‭system.‬ ‭What‬ ‭methods‬ ‭could‬ ‭be‬ ‭used‬ ‭to‬ ‭gather‬ ‭data‬ ‭about‬ ‭the‬ ‭existing‬
‭system? Give reasons for your choice.‬
‭(b)‬ ‭What‬ ‭would‬ ‭need‬ ‭to‬ ‭be‬ ‭done‬ ‭before‬ ‭the‬ ‭new‬ ‭computerised‬ ‭system‬
‭become ‘Live’?‬
‭(c)‬‭Why‬‭would‬‭PILOT‬‭and‬‭PARALLEL‬‭change‬‭over‬‭methods‬‭be‬‭suitable‬‭in‬‭this‬
‭application?‬
‭2.‬ ‭A‬ ‭program‬ ‭is‬ ‭written‬ ‭to‬ ‭input‬ ‭daily‬ ‭temperatures.‬ ‭Name‬ ‭three‬ ‭types‬ ‭o f‬ ‭test‬
‭data‬ ‭that‬ ‭could‬ ‭be‬ ‭used.‬‭Give‬‭examples‬‭o f‬‭each‬‭type‬‭o f‬‭test‬‭data‬‭which‬‭could‬
‭be used and discuss the outputs you would expect to get.‬
‭3.‬ ‭Name‬ ‭five‬ ‭tasks‬ ‭that‬ ‭would‬ ‭be‬ ‭carried‬ ‭o ut‬ ‭at‬ ‭the‬ ‭DESIGN‬ ‭stage‬ ‭in‬ ‭systems‬
‭analysis.‬
‭4.‬ ‭Name‬ ‭four‬ ‭methods‬ ‭used‬ ‭to‬ ‭change‬ ‭over‬ ‭from‬ ‭a‬ ‭manual‬ ‭system‬ ‭to‬ ‭a‬ ‭new‬
‭computerised‬ ‭system.‬ ‭Discuss‬ ‭the‬ ‭relative‬ ‭advantages‬ ‭and‬ ‭disadvantages‬ ‭o f‬
‭these four methods.‬
‭5.‬ ‭Describe how the effectiveness of a new computer system can be assessed‬
‭6.‬ ‭What‬ ‭tools‬ ‭exist‬ ‭to‬ ‭help‬ ‭the‬ ‭analyst‬ ‭draw‬ ‭up‬ ‭an‬‭action‬‭plan‬‭and‬‭ensure‬‭that‬
‭the project is completed on time and to budget?‬
‭7.‬ ‭What‬ ‭information‬ ‭would‬ ‭a‬‭systems‬‭analyst‬‭need‬‭to‬‭gather‬‭to‬‭decide‬‭o n‬‭what‬
‭hardware is required for a new computerised system?‬
‭8.‬ ‭State‬ ‭5‬ ‭items‬ ‭that‬ ‭need‬ ‭to‬ ‭be‬ ‭included‬ ‭in‬ ‭the‬ ‭User‬ ‭guide‬ ‭and‬ ‭5‬ ‭items‬ ‭o f‬ ‭the‬
‭technical guide of a newly developed computer system.‬
‭9.‬ ‭Choose 6 symbols used in systems flowcharts and explain what each means.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭73‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ATA CAPTURE / COLLECTION‬
D
‭Data capturing can be either automatic or manual.‬
‭Manual‬‭methods‬‭are‬‭slow‬‭in‬‭entering‬‭data‬‭and‬‭are‬‭also‬‭prone‬‭to‬‭errors,‬‭e.g.‬‭typing‬
‭2.3 instead of 3.2. Manual data capturing techniques includes the following:‬
‭-‬ ‭keyboards/keypads to type in data‬
‭-‬ ‭touch screens to select data/options‬
‭Automatic‬ ‭data‬ ‭capturing‬ ‭techniques‬ ‭are‬ ‭more‬ ‭accurate‬ ‭and‬ ‭faster‬ ‭but‬ ‭are‬ ‭more‬
‭expensive and involves use of the following:‬
‭(a)‬ ‭Data‬ ‭logging‬‭:‬ ‭this‬ ‭technique‬ ‭involves‬ ‭collecting‬ ‭data‬ ‭automatically‬ ‭using‬
‭sensors;‬ ‭mostly‬ ‭used‬ ‭when‬ ‭doing‬ ‭scientific‬ ‭experiments‬ ‭o r‬ ‭monitoring‬ ‭a‬
‭control system‬
‭(b)‬ ‭Barcode‬ ‭readers‬‭:‬ ‭these‬ ‭take‬ ‭data‬ ‭from‬ ‭printed‬ ‭barcodes‬ ‭and‬ ‭allow‬
‭automatic stock control in, for example, supermarkets.‬
‭(c)‬ ‭Radio‬‭Frequency‬‭Identification‬‭(RFID):‬‭this‬‭method‬‭involves‬‭using‬‭small‬
‭electronic‬ ‭devices‬ ‭containing‬ ‭a‬ ‭microchip‬ ‭and‬ ‭antenna;‬ ‭they‬ ‭work‬ ‭in‬ ‭a‬
‭similar‬‭way‬‭to‬‭bar‬‭codes‬‭but‬‭can‬‭be‬‭read‬‭from‬‭a‬‭distance‬‭o f‬‭5‬‭metres;‬‭o ften‬
‭used to track livestock, vehicles, library books and goods sold in shops.‬
‭(d)‬ ‭Biometrics:‬ ‭this‬ ‭involves‬ ‭o btaining‬ ‭data‬ ‭and‬ ‭identifying‬ ‭characteristics‬
‭automatically‬‭in‬‭security‬‭systems‬‭e.g.‬‭use‬‭o f‬‭finger‬‭prints,‬‭palm‬‭prints,‬‭facial‬
‭images and iris prints‬
‭(e)‬ ‭Magnetic‬ ‭Strips:‬ ‭these‬ ‭contain‬ ‭information/data‬ ‭stored‬ ‭o n‬ ‭magnetic‬
‭material‬ ‭o ften‬ ‭o n‬ ‭the‬ ‭back‬ ‭o f‬ ‭a‬ ‭credit/debit‬ ‭card;‬ ‭the‬ ‭information‬ ‭is‬
‭automatically‬ ‭read‬ ‭by‬ ‭swiping‬ ‭the‬ ‭magnetic‬ ‭stripe‬ ‭past‬ ‭a‬ ‭reading‬ ‭head‬
‭(reading device).‬
‭(f)‬ ‭Optical‬ ‭character‬ ‭recognition‬‭(OCR):‬‭information‬‭o n‬‭paper‬‭is‬‭automatically‬
‭read‬ ‭by‬ ‭a‬ ‭scanner‬ ‭and‬ ‭is‬ ‭then‬ ‭analysed/processed‬ ‭by‬ ‭OCR‬ ‭software‬ ‭and‬
‭stored in an electronic format.‬
‭( g)‬ ‭Voice‬ ‭recognition:‬ ‭these‬ ‭systems‬ ‭recognise‬‭spoken‬‭words‬‭e.g.‬‭for‬‭disabled‬
‭people‬ ‭who‬ ‭can’t‬ ‭use‬ ‭keyboards‬ ‭where‬ ‭they‬ ‭speak‬ ‭commands‬ ‭instead‬ ‭o f‬
‭having to type‬
‭(h)‬ ‭Smart‬ ‭cards:‬ ‭these‬ ‭contain‬‭embedded‬‭microchips‬‭and‬‭receive‬‭power‬‭from‬
‭the‬ ‭card‬ ‭readers;‬ ‭the‬ ‭microchip‬ ‭is‬ ‭made‬ ‭up‬ ‭o f‬ ‭RAM,‬ ‭ROM‬ ‭and‬ ‭16-bit‬
‭processor‬ ‭and‬ ‭the‬ ‭stored‬ ‭data‬ ‭is‬ ‭automatically‬ ‭read‬ ‭by‬ ‭the‬ ‭card‬ ‭reader;‬
‭used in credit cards, security cards, loyalty cards, etc.‬
‭(i)‬ ‭Optical‬‭Mark‬‭Recognition‬‭(OMR):‬‭OMR‬‭technology‬‭scans‬‭a‬‭printed‬‭form‬‭and‬
‭reads‬ ‭pre-defined‬ ‭positions‬ ‭(where‬ ‭specific‬ ‭fields‬ ‭have‬ ‭been‬ ‭filled‬ ‭in‬ ‭e.g.‬
‭●‬‭─‬‭●‬ ‭o r‬ ‭▄‬‭);‬ ‭the‬ ‭system‬ ‭records‬ ‭where‬ ‭marks‬ ‭have‬ ‭been‬ ‭made‬ ‭so‬ ‭can‬
‭automatically determine responses to, for example, a questionnaire.‬

‭ ATA ENTRY ERRORS‬


D
‭Data‬ ‭can‬ ‭be‬ ‭entered‬ ‭incorrectly‬ ‭into‬ ‭the‬ ‭computer‬ ‭and‬ ‭this‬ ‭can‬ ‭have‬ ‭the‬ ‭following‬
‭effects:‬
‭-‬ ‭A‬ ‭company‬ ‭can‬ ‭be‬ ‭prosecuted‬ ‭under‬ ‭the‬ ‭Data‬ ‭Protection‬ ‭Act‬ ‭if‬ ‭incorrect‬
‭information causes a person or organisation some loss.‬
‭- Wrong decisions can be made by managers due to wrong information given.‬
‭- Customers may be angry if they are sent wrong bills.‬

‭ ypes of Errors‬
T
‭1.‬‭Transcription‬‭Errors:‬‭These‬‭are‬‭mistakes‬‭due‬‭to‬‭misreading‬‭o r‬‭mistyping‬‭o f‬‭data,‬
‭e.g.,‬‭confusing‬‭the‬‭number‬‭5‬‭with‬‭the‬‭letter‬‭S,‬‭0‬‭(zero)‬‭instead‬‭o f‬‭the‬‭letter‬‭O,‬‭etc.‬‭This‬
‭can also be caused by bad handwriting.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭74‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ .‬‭Transposition‬‭Errors:‬‭These‬‭are‬‭mistakes‬‭caused‬‭by‬‭swapping‬‭2‬‭letters‬‭o r‬‭digits,‬
2
‭e.g.‬ ‭typing‬ ‭‘ot’‬ ‭instead‬ ‭o f‬ ‭‘to’,‬ ‭5721‬ ‭instead‬ ‭o f‬ ‭7521.‬ ‭Transposition‬ ‭errors‬ ‭o ccur‬
‭mostly when typing at very high speeds.‬

‭ voiding Data Entry Errors‬


A
‭The following procedures can be used to avoid / reduce data entry errors:‬
‭1.‬‭Verification:‬‭Involves‬‭checking‬‭whether‬‭what‬‭has‬‭been‬‭entered‬‭into‬‭the‬‭computer‬
‭is‬ ‭similar‬ ‭to‬ ‭what‬ ‭is‬ ‭o n‬ ‭the‬ ‭input‬ ‭document.‬ ‭Also‬ ‭done‬ ‭data‬ ‭is‬ ‭copied‬ ‭from‬ ‭o ne‬
‭medium‬‭to‬‭another,‬‭e.g.‬‭from‬‭paper‬‭to‬‭disk.‬‭Verification‬‭is‬‭done‬‭manually‬‭by‬‭the‬‭user‬
‭o f‬ ‭the‬ ‭computer.‬ ‭Verification‬ ‭is‬ ‭carried‬ ‭o ut‬ ‭to‬ ‭determine‬ ‭errors‬ ‭that‬ ‭cannot‬ ‭be‬
‭detected by the computer.‬
‭NB‬‭:-Verification‬‭can‬‭also‬‭be‬‭used‬‭to‬‭determine‬‭if‬‭data‬‭has‬‭been‬‭correctly‬‭transferred‬
‭from one place to other(e.g. between devices or on a network).‬
‭Verification can be done in the following forms:‬
‭(a) Double entry:‬
‭●‬ ‭In‬‭this‬‭method,‬‭data‬‭is‬‭entered‬‭twice‬‭(using‬‭two‬‭different‬‭people);‬‭the‬‭data‬‭is‬
‭o nly accepted if both versions are similar.‬
‭●‬ ‭Double‬‭entry‬‭is‬‭o ften‬‭used‬‭to‬‭verify‬‭passwords‬‭by‬‭asking‬‭them‬‭to‬‭be‬‭typed‬‭in‬
‭again by the same person twice.‬
‭(b) Visual Checking‬
‭●‬ ‭This‬ ‭is‬ ‭checking‬ ‭for‬ ‭errors‬ ‭by‬ ‭comparing‬ ‭entered‬ ‭data‬ ‭with‬ ‭the‬ ‭o riginal‬
‭document‬‭(NOTE:‬‭this‬‭is‬‭not‬‭the‬‭same‬‭as‬‭proof‬‭reading!!)‬‭.‬‭If‬‭the‬‭entered‬‭data‬‭is‬
‭similar with the source document, then it has been entered correctly.‬
‭(c) Parity Checking‬
‭This‬‭is‬‭used‬‭in‬‭determining‬‭whether‬‭data‬‭has‬‭been‬‭correctly‬‭transmitted‬‭between‬
‭computer‬ ‭devices‬ ‭o r‬ ‭o n‬ ‭a‬ ‭network.‬ ‭It‬ ‭uses‬ ‭parity‬ ‭bits‬ ‭to‬ ‭verify‬ ‭correctness‬ ‭o f‬
‭transmitted data.‬
‭●‬ ‭Parity‬‭Bits:‬‭A‬‭parity‬‭bit‬‭is‬‭an‬‭extra‬‭bit‬‭(1‬‭o r‬‭0)‬‭that‬‭is‬‭appended‬‭to‬‭the‬‭left‬‭o f‬
‭a‬ ‭byte‬ ‭to‬ ‭make‬ ‭it‬ ‭even‬ ‭o r‬ ‭o dd‬ ‭depending‬ ‭o n‬ ‭the‬ ‭method‬ ‭o f‬ ‭parity‬ ‭checking‬
‭being‬ ‭used.‬ ‭It‬ ‭is‬ ‭used‬ ‭in‬ ‭checking‬ ‭for‬ ‭errors‬ ‭in‬ ‭a‬ ‭group‬ ‭o f‬ ‭bits‬ ‭transferred‬
‭within‬‭o r‬‭between‬‭computers.‬‭Parity‬‭bits‬‭are‬‭also‬‭used‬‭to‬‭determine‬‭if‬‭a‬‭block‬
‭o f‬ ‭data‬ ‭has‬ ‭been‬ ‭correctly‬ ‭transmitted‬ ‭over‬ ‭a‬ ‭communication‬ ‭channel.‬ ‭It‬
‭works in the following way:‬
‭●‬ ‭Using‬ ‭Odd‬ ‭Parity:‬ ‭The‬ ‭letter‬ ‭C‬ ‭is‬ ‭transmitted‬ ‭as‬ ‭1000011‬‭.‬ ‭Since‬ ‭there‬ ‭are‬
‭three‬‭1s‬‭in‬‭this‬‭byte,‬‭a‬‭0‬‭is‬‭added‬‭to‬‭the‬‭left‬‭so‬‭that‬‭the‬‭total‬‭for‬‭1s‬‭is‬‭o dd,‬‭thus‬
‭making it‬‭0‬‭1000011.‬‭The first 0 (underlined) is used‬‭as the parity bit.‬
‭●‬ ‭Using‬ ‭even‬ ‭parity:‬ ‭In‬ ‭even‬ ‭parity,‬ ‭a‬ ‭1‬ ‭would‬ ‭be‬ ‭appended‬ ‭to‬ ‭the‬‭left‬‭o f‬‭the‬
‭byte so that the total number of ones is even, thus making it‬‭1‬‭1000011‬

‭ .‬ ‭Validation:‬ ‭A‬ ‭process‬ ‭done‬ ‭by‬ ‭the‬ ‭computer‬ ‭to‬ ‭detect‬ ‭if‬ ‭data‬ ‭entered‬ ‭is‬ ‭valid,‬
2
‭correct,‬ ‭complete,‬ ‭sensible‬ ‭and‬ ‭reasonable.‬ ‭For‬ ‭instance‬ ‭the‬ ‭height‬ ‭o f‬ ‭a‬ ‭person‬
‭entered‬ ‭as‬ ‭12‬ ‭metres‬ ‭is‬ ‭incorrect,‬ ‭is‬ ‭not‬ ‭sensible,‬ ‭neither‬ ‭is‬ ‭it‬ ‭reasonable,‬ ‭and‬
‭therefore‬‭the‬‭computer‬‭should‬‭reject‬‭this.‬‭Validation‬‭is‬‭a‬‭process‬‭o f‬‭checking‬‭if‬‭data‬
‭satisfies‬‭certain‬‭criteria‬‭when‬‭input‬‭i.e.‬‭falls‬‭within‬‭accepted‬‭boundaries.‬‭Validation‬‭is‬
‭done by the computer.‬

‭ ypes of Validation Checks on Data‬


T
‭(a)‬‭Character‬‭type‬‭c heck:‬‭A‬‭validation‬‭check‬‭for‬‭detecting‬‭if‬‭the‬‭correct‬‭characters‬
‭have‬ ‭been‬ ‭entered,‬ ‭for‬ ‭example‬ ‭can‬ ‭detect‬ ‭and‬ ‭reject‬ ‭alphabetic‬ ‭letters‬ ‭where‬
‭numbers‬ ‭are‬ ‭needed.‬ ‭The‬‭computer‬‭should‬‭also‬‭reject‬‭if‬‭a‬‭digit‬‭is‬‭entered‬‭where‬‭a‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭75‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ame‬‭is‬‭needed,‬‭e.g.‬‭John5‬‭is‬‭wrong‬‭since‬‭there‬‭is‬‭a‬‭wrong‬‭character‬‭in‬‭the‬‭name,‬‭i.e.,‬
n
‭5.‬
‭(b)‬‭Range‬‭Checks:‬‭Are‬‭validation‬‭checks‬‭performed‬‭o n‬‭data‬‭to‬‭make‬‭sure‬‭they‬‭lie‬‭in‬
‭a‬ ‭specified‬ ‭range.‬ ‭For‬ ‭example,‬‭you‬‭are‬‭required‬‭to‬‭enter‬‭a‬‭number‬‭between‬‭5‬‭and‬
‭20,‬ ‭and‬ ‭you‬ ‭enter‬ ‭51,‬ ‭the‬ ‭computer‬ ‭should‬ ‭automatically‬ ‭reject‬ ‭this‬ ‭since‬ ‭it‬ ‭lies‬
‭o utside the required range.‬
‭(c)‬ ‭Limit‬ ‭Check‬‭:‬ ‭this‬ ‭is‬ ‭similar‬ ‭to‬ ‭a‬ ‭range‬ ‭check‬ ‭except‬ ‭o nly‬ ‭ONE‬ ‭o f‬ ‭the‬ ‭limits‬
‭(boundaries) is checked e.g. input data must be > 10.‬
‭(d)‬ ‭Presence‬ ‭c hecks:‬ ‭check‬ ‭that‬ ‭data‬ ‭is‬‭actually‬‭present‬‭and‬‭not‬‭missed‬‭o ut‬‭e.g.‬‭in‬
‭Student‬ ‭form,‬ ‭somebody’s‬ ‭Student‬ ‭Surname‬ ‭may‬ ‭been‬ ‭left‬ ‭o ut‬ ‭yet‬ ‭it‬ ‭is‬ ‭a‬ ‭required‬
‭field‬‭name.‬‭The‬‭computer‬‭does‬‭not‬‭allow‬‭the‬‭user‬‭to‬‭continue‬‭until‬‭an‬‭entry‬‭has‬‭been‬
‭made in a required field name.‬
‭(e)‬‭Length‬‭c hecks:‬‭These‬‭are‬‭validation‬‭checks‬‭used‬‭to‬‭determine‬‭if‬‭data‬‭entered‬‭is‬
‭o f‬‭the‬‭required‬‭number‬‭o f‬‭characters.‬‭For‬‭example,‬‭if‬‭a‬‭student‬‭number‬‭has‬‭5‬‭digits,‬
‭the‬ ‭computer‬ ‭should‬ ‭reject‬ ‭if‬ ‭a‬ ‭number‬ ‭with‬ ‭4‬ ‭o r‬ ‭less‬‭digits‬‭o r‬‭even‬‭more‬‭digits‬‭is‬
‭entered.‬
‭(f)‬ ‭Format‬ ‭Check‬‭:‬ ‭this‬ ‭checks‬ ‭that‬‭data‬‭is‬‭in‬‭a‬‭specified‬‭format‬‭(template)‬‭e.g.‬‭date‬
‭should be in the form dd/mm/yyyy.‬
‭( g)‬‭Consistence‬‭(Cross‬‭Field)‬‭Check‬‭:‬‭this‬‭checks‬‭if‬‭fields‬‭correspond‬‭with‬‭the‬‭o ther,‬
‭e.g.‬ ‭if‬ ‭o ne‬ ‭enters‬ ‭‘‬‭MR’‬‭o n‬‭Title‬‭field,‬‭the‬‭Sex‬‭field‬‭must‬‭contain‬‭‘‬‭Male’‬‭o r‬‭‘‬‭M‬‭’.‬‭If‬‭o ne‬
‭enters‬‭the‬‭title‬‭as‬‭Mr‬‭and‬‭then‬‭o n‬‭sex‬‭enters‬‭Female‬‭,‬‭there‬‭is‬‭no‬‭correspondence‬‭o n‬
‭the two fields and therefore the computer must reject this.‬
‭(h)‬ ‭Spell‬ ‭Checkers:‬ ‭These‬ ‭are‬ ‭validation‬‭checks‬‭that‬‭determine‬‭if‬‭accurate‬‭text‬‭has‬
‭been‬ ‭entered‬ ‭especially‬ ‭in‬ ‭word‬ ‭processing.‬ ‭Spell‬ ‭checkers‬‭use‬‭custom‬‭dictionaries‬
‭to‬ ‭check‬ ‭spelling‬‭mistakes‬‭in‬‭documents.‬‭If‬‭a‬‭word‬‭is‬‭typed‬‭in,‬‭it‬‭is‬‭checked‬‭if‬‭it‬‭is‬‭in‬
‭the‬‭custom‬‭dictionary,‬‭if‬‭not,‬‭it‬‭is‬‭treated‬‭as‬‭an‬‭error.‬‭Spell‬‭checkers‬‭cannot‬‭be‬‭used‬‭in‬
‭case of names of people, places, computer jargon, new slang words, etc.‬
‭(i)‬‭Control‬‭Total:‬‭this‬‭is‬‭a‬‭meaningful‬‭total‬‭o btained‬‭by‬‭adding‬‭together‬‭all‬‭data‬‭in‬‭a‬
‭table,‬ ‭e.g.‬ ‭prices‬ ‭o f‬ ‭goods‬ ‭to‬ ‭give‬ ‭a‬ ‭total.‬ ‭If‬ ‭the‬ ‭total‬ ‭does‬ ‭not‬ ‭tally,‬ ‭then‬ ‭o ther‬
‭elements‬ ‭may‬ ‭have‬ ‭been‬ ‭left‬ ‭o ut.‬ ‭This‬ ‭total‬ ‭is‬ ‭meaningful‬ ‭since‬ ‭it‬ ‭may‬ ‭be‬ ‭used‬ ‭to‬
‭deduce if the organisation is making profit or not.‬
‭( j)‬ ‭Hash‬ ‭Total:‬ ‭It‬ ‭is‬ ‭a‬ ‭meaningless‬ ‭total,‬ ‭o btained‬‭by‬‭adding‬‭together‬‭all‬‭digits‬‭in‬‭a‬
‭field‬ ‭like‬ ‭serial‬ ‭numbers‬ ‭o f‬ ‭a‬ ‭product‬ ‭to‬ ‭give‬ ‭a‬ ‭total‬ ‭that‬ ‭is‬ ‭used‬ ‭for‬ ‭validation‬
‭purposes‬ ‭o nly.‬ ‭The‬ ‭total‬ ‭o btained‬ ‭is‬ ‭not,‬ ‭and‬ ‭cannot‬ ‭be‬ ‭used‬ ‭to‬ ‭deduce‬ ‭any‬ ‭o ther‬
‭meaning.‬ ‭Thus‬ ‭in‬ ‭this‬ ‭case,‬ ‭the‬ ‭total‬ ‭o btained‬ ‭by‬ ‭adding‬ ‭product‬ ‭serial‬ ‭numbers‬
‭cannot be used for any other purpose.‬
‭(k)‬ ‭Check‬ ‭Sum:‬‭A‬‭validation‬‭check‬‭o f‬‭adding‬‭together‬‭the‬‭digits‬‭in‬‭a‬‭block‬‭to‬‭give‬‭a‬
‭number‬ ‭that‬ ‭will‬ ‭be‬ ‭transmitted‬ ‭together‬ ‭with‬‭the‬‭data.‬‭It‬‭is‬‭used‬‭to‬‭check‬‭whether‬
‭errors‬‭have‬‭o ccurred‬‭in‬‭transmission‬‭o r‬‭storage.‬‭Checksum‬‭can‬‭also‬‭imply‬‭hash‬‭total‬
‭and control total.‬
‭(l)‬‭Data‬‭Type‬‭c heck:‬‭This‬‭is‬‭used‬‭to‬‭check‬‭if‬‭data‬‭entered‬‭is‬‭o f‬‭the‬‭correct‬‭data‬‭type.‬
‭For‬ ‭example,‬ ‭Quantity‬ ‭of‬ ‭Items‬ ‭bought‬ ‭is‬ ‭an‬ ‭integer‬ ‭data‬ ‭type,‬ ‭therefore‬ ‭it‬ ‭must‬
‭reject‬‭fractions.‬‭Thus‬‭the‬‭correct‬‭data‬‭type‬‭is‬‭considered‬‭in‬‭this‬‭situation.‬‭Data‬‭types‬
‭includes Boolean, integers, char, etc.‬

(‭ m)‬ ‭Check‬ ‭Digits:‬ ‭A‬ ‭check‬ ‭digit‬ ‭is‬ ‭an‬ ‭extra‬ ‭digit‬ ‭appended‬ ‭to‬ ‭the‬ ‭right‬ ‭-end‬ ‭o f‬ ‭an‬
‭o riginal‬ ‭number‬ ‭for‬ ‭error‬ ‭checking‬ ‭purposes‬ ‭and‬ ‭is‬ ‭calculated‬ ‭from‬ ‭the‬ ‭o riginal‬
‭block of data using modulus 11.‬
‭*NB:‬ ‭-‬ ‭Check‬ ‭digits‬ ‭are‬ ‭used‬ ‭where‬ ‭data‬ ‭is‬ ‭entered‬ ‭automatically‬ ‭as‬ ‭in‬ ‭using‬
‭barcode‬ ‭readers‬ ‭and‬ ‭are‬ ‭important‬ ‭for‬ ‭c hecking‬ ‭for‬ ‭transposition‬ ‭errors‬
‭(swapped digits)‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭76‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ alculating Check Digits‬
C
‭Using‬ ‭the‬ ‭Modulus‬ ‭11‬ ‭method:‬ ‭Suppose‬ ‭a‬ ‭product‬ ‭number‬ ‭has‬ ‭been‬ ‭entered‬‭as:‬
‭151211323‬‭; the following procedures will be used to‬‭calculate its check digit.‬

‭ e‬ ‭have‬ ‭9‬ ‭digits.‬ ‭Working‬ ‭from‬ ‭the‬ ‭right,‬ ‭the‬ ‭first‬ ‭digit‬ ‭is‬ ‭multiplied‬ ‭by‬ ‭2,‬ ‭second‬
W
‭number‬ ‭by‬ ‭3,‬ ‭third‬ ‭number‬ ‭by‬ ‭4‬ ‭and‬‭so‬‭o n.‬‭We‬‭start‬‭at‬‭2‬‭because‬‭position‬‭1‬‭is‬‭for‬
‭the check digit. The results are added together, e.g.‬
‭(1x10) + (5x9) + (1x8) + (2x7) + (1x6) + (1x5) + (3x4) + (2x3) + (3x2) = 112‬
‭The‬‭total‬‭(112)‬‭is‬‭divided‬‭by‬‭11‬‭and‬‭the‬‭remainder‬‭is‬‭noted;‬‭e.g.,‬‭112‬‭divided‬‭by‬‭11‬‭=‬
‭10 remainder 2.‬
‭The remainder is subtracted from 11 to give the check digit: 11 – 2 =‬‭9‬
‭9‬‭becomes the check digit. Therefore the number will‬‭be transmitted as‬‭1512113239‬
‭*NB: -‬
‭(1)‬‭If the check digit found is‬‭10,‬‭an‬‭X‬‭is used as‬‭the check digit‬‭.‬
‭(2)‬‭If,‬‭upon‬‭dividing‬‭the‬‭total‬‭by‬‭11‬‭and‬‭the‬‭remainder‬‭is‬‭0,‬‭then‬‭0‬‭is‬‭the‬‭check‬‭digit.‬
‭This‬ ‭is‬ ‭o btained‬ ‭as,‬ ‭11-0=11.‬ ‭Divide‬ ‭11‬ ‭by‬ ‭11‬ ‭and‬ ‭take‬ ‭the‬ ‭remainder,‬ ‭which‬ ‭is‬ ‭1‬
‭remainder 0, thus 0 becomes the check digit.‬

‭(3)‬‭Check digits are used to detect where digits have‬‭been‬‭swapped‬

‭NB: thus the procedure of calculating check digits is summarised as follows:‬

-‭ ‬ ‭ llocate weights for digits from right going to the left, starting as 2.‬
A
‭-‬ ‭Multiply each digit with its weight and add them.‬
‭-‬ ‭Divide the total by its modulus (11 in our case) and get the remainder.‬
‭-‬ ‭Subtract the remainder from the modulus (11)‬
‭-‬ ‭The result will be the check digit.‬
‭-‬ ‭However,‬‭some‬‭authors‬‭go‬‭further‬‭by‬‭saying‬‭that,‬‭divide‬‭the‬‭answer‬‭(obtained‬
‭after‬ ‭subtracting‬ ‭from‬ ‭11)‬ ‭by‬ ‭its‬ ‭modulus‬ ‭(11)‬ ‭and‬ ‭take‬ ‭the‬ ‭remainder.‬‭The‬
‭remainder is the check digit.‬

‭Proving whether the given check digit is correct or not.‬

‭This is done using two methods, which are:‬

(‭ 1).‬ ‭Remove‬ ‭the‬ ‭given‬ ‭check‬ ‭digit,‬ ‭calculate‬ ‭your‬ ‭own‬ ‭check‬ ‭digit.‬ ‭If‬ ‭they‬ ‭are‬
‭similar,‬‭then‬‭the‬‭check‬‭digit‬‭is‬‭correct.‬‭If‬‭they‬‭are‬‭not‬‭similar,‬‭then‬‭the‬‭given‬‭check‬
‭digit is wrong.‬

(‭ 2)‬ ‭Re-calculate‬ ‭without‬ ‭removing‬ ‭the‬ ‭given‬ ‭check‬‭digit‬‭using‬‭the‬‭example‬‭given‬


‭below:‬

‭Example:‬

‭The ISBN to check is given as with X as the check digit: 0 - 1 3 1 5 - 2 4 4 7 – X‬

‭Remember X means 10, so 10 is the check digit in the example above.‬

‭ ere,‬ ‭the‬ ‭check‬ ‭digit‬ ‭is‬ ‭o n‬ ‭position‬ ‭1.‬ ‭So‬ ‭the‬ ‭numbers‬ ‭and‬ ‭their‬ ‭positions‬ ‭is‬ ‭as‬
H
‭follows:‬

‭Position‬ ‭10‬ ‭9‬ ‭8‬ ‭7‬ ‭6‬ ‭5‬ ‭4‬ ‭3‬ ‭2‬ ‭1‬

‭Digit‬ ‭0‬ ‭1‬ ‭3‬ ‭1‬ ‭5‬ ‭2‬ ‭4‬ ‭4‬ ‭7‬ ‭X‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭77‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Multiply each digit with its position and add the results, thus giving:‬

‭(10x0)+(9x1)+(8x3)+(7x1)+(6x5)+(5x2)+(4x4)+(3x4)+(2x7)+(1x10) =‬‭132‬

‭Divide 132 by modulus (11) and get the remainder. This gives us 12 remainder 0.‬

‭Therefore the check digit is correct.‬

‭ B‬‭:‬‭If‬‭the‬‭remainder‬‭o btained‬‭is‬‭0,‬‭then‬‭the‬‭check‬‭digit‬‭is‬‭correct,‬‭if‬‭not,‬‭then‬‭the‬
N
‭check digit is wrong.‬

‭Questions‬

‭1.‬ D ‭ escribe‬ ‭4‬ ‭methods‬ ‭o f‬ ‭automatic‬ ‭data‬ ‭capture,‬ ‭giving‬‭an‬‭application‬‭o f‬‭each‬


‭method‬
‭2.‬ ‭A record contains the following fields:‬
‭-‬ ‭Title (Mr/Mrs/Miss) and Sex (Male or Female)‬
‭-‬ ‭Date of birth (written in the form dd/mm/yyyy)‬
‭-‬ ‭Pay Number (which is made up of 8 digits)‬
‭-‬ ‭Telephone Number‬
‭-‬ ‭Pay‬
‭Give‬‭a‬‭different‬‭validation‬‭check‬‭for‬‭each‬‭o f‬‭the‬‭above‬‭fields‬‭and‬‭explain‬‭why‬
‭it is used.‬
‭3.‬ ‭(a) Which of the following numbers have the correct check digit?‬
‭(i) 0 – 5 5 5 – 2 1 6 2 2 – 5‬
‭(ii) 0 – 1 2 1 – 9 0 0 2 1 – X‬
‭(b) Calculate the check digit for the following number:‬
‭0 1 5 0 2 4 6 2 2 ………‬
‭(c) Discuss the types of errors that check digits can identify.‬

‭4.‬ (‭ a) Give 2 different ways of carrying out verification checks.‬


‭(b) Give 2 examples of situations where verification would be used.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭78‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭SOFTWARE‬
S‭ oftware‬ ‭refers‬ ‭to‬ ‭a‬ ‭set‬ ‭o f‬ ‭instructions‬ ‭written‬ ‭in‬ ‭computer‬ ‭language‬ ‭that‬ ‭tell‬ ‭a‬
‭computer‬‭to‬‭perform‬‭a‬‭specific‬‭task,‬‭like‬‭adding‬‭a‬‭set‬‭o f‬‭numbers.‬‭Without‬‭software,‬
‭a‬ ‭computer‬ ‭will‬ ‭be‬ ‭useless.‬ ‭Software‬ ‭is‬ ‭grouped‬ ‭into‬ ‭systems‬ ‭software‬ ‭and‬
‭application software.‬‭The diagram below illustrates‬‭branches/groups of software:‬

‭ ystems‬‭Software:‬‭Refers‬‭to‬‭programs‬‭that‬‭control‬‭and‬‭manages‬‭the‬‭performance‬‭o f‬
S
‭all‬‭computer‬‭systems.‬‭Systems‬‭software‬‭comprises‬‭o f:‬ ‭(a)‬ ‭o perating‬ ‭systems‬ ‭(b)‬
‭Utility programs (c) Translators (d) Device drivers‬

‭ )‬ ‭Operating‬ ‭System:‬ ‭-‬ ‭refers‬ ‭to‬ ‭the‬ ‭programs‬‭that‬‭supervise,‬‭control‬‭and‬‭manage‬


1
‭the‬ ‭performance‬ ‭o f‬ ‭the‬ ‭computer‬ ‭hardware‬ ‭and‬ ‭software‬ ‭in‬ ‭accordance‬ ‭with‬ ‭set‬
‭o bjectives,‬ ‭for‬ ‭example,‬ ‭Windows‬ ‭7.‬ ‭Examples‬ ‭o f‬ ‭o perating‬ ‭systems‬ ‭include:‬
‭Windows‬ ‭95/98/2000/XP/‬ ‭VISTA/‬ ‭Windows‬ ‭7/Windows‬ ‭8,‬ ‭Microsoft‬ ‭Disk‬
‭Operating System (MS-DOS), Unix, Linux, OS/2, Ubuntu, etc.‬
‭The‬‭o perating‬‭system‬‭is‬‭loaded‬‭o nto‬‭the‬‭computer‬‭by‬‭the‬‭bootstrap‬‭loader.‬‭Programs‬
‭stored‬ ‭o n‬ ‭ROM‬ ‭chip‬ ‭runs‬ ‭first‬ ‭and‬ ‭this‬ ‭checks‬ ‭if‬ ‭all‬ ‭hardware‬ ‭components‬ ‭are‬
‭working‬ ‭normally.‬ ‭It‬ ‭also‬ ‭checks‬ ‭the‬ ‭CPU‬ ‭and‬ ‭the‬‭Basic‬‭Input‬‭o utput‬‭System‬‭(BIOS)‬
‭for‬‭errors.‬‭If‬‭there‬‭are‬‭no‬‭errors,‬‭the‬‭BIOS‬‭will‬‭activate‬‭the‬‭disc‬‭drive.‬‭The‬‭o perating‬
‭system‬ ‭is‬ ‭then‬ ‭found‬ ‭and‬ ‭the‬ ‭computer‬ ‭can‬ ‭boot.‬ ‭Booting‬ ‭refers‬ ‭to‬ ‭the‬ ‭process‬ ‭o f‬
‭loading‬‭the‬‭Operating‬‭system‬‭into‬‭memory‬‭so‬‭that‬‭it‬‭takes‬‭control‬‭over‬‭hardware‬‭and‬
‭software resources of the computer.‬

‭Functions of the operating systems:‬


‭-‬ ‭Controls movement of data to and from peripherals.‬
‭-‬ ‭Acts as a background on which application programs can run.‬
‭-‬ ‭Device‬ ‭management/Input-Output‬ ‭management‬‭:‬ ‭Operating‬ ‭system‬
‭manages hardware components of the computer‬
‭-‬ ‭Handling of interrupts‬
‭-‬ ‭Manage software resources of the computer‬
‭-‬ ‭Memory management‬‭: Manages memory resources of a‬‭computer‬
‭-‬ ‭Acts as an interface between the user and the computer.‬
‭-‬ ‭Scheduling of tasks‬
‭-‬ ‭Loading and running of programs‬
‭-‬ ‭Provides a log of users for the computer.‬
‭-‬ ‭Handling‬ ‭o f‬ ‭errors‬ ‭and‬ ‭correcting‬‭them‬‭where‬‭possible.‬‭(error‬‭handling‬‭and‬
‭reporting)‬
‭-‬ ‭Protect hardware, software and data from improper use.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭79‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ C ‭ ontrol‬‭over‬‭the‬‭selection‬‭and‬‭o peration‬‭o f‬‭input,‬‭o utput‬‭and‬‭storage‬‭devices‬
‭o f the computer.‬
‭-‬ ‭Used for spooling‬
‭-‬ ‭Maintain user accounts‬
‭-‬ ‭Booting and properly shutting down the computer.‬
‭-‬ ‭File management‬

‭ B‬‭:‬ ‭Household‬ ‭equipment‬ ‭like‬ ‭refrigerator‬ ‭do‬ ‭not‬ ‭have‬ ‭an‬ ‭o perating‬ ‭system‬ ‭since‬
N
‭the‬ ‭processor‬ ‭has‬ ‭o ne‬ ‭task‬ ‭to‬ ‭perform,‬ ‭no‬ ‭multiple‬ ‭devices‬ ‭and‬ ‭tasks‬ ‭to‬ ‭handle,‬
‭hence they are cheap.‬

‭Features (characteristics) of operating systems:‬


‭-‬ ‭Must be reliable in terms of being free from errors and handling of all jobs.‬
‭-‬ ‭Must‬ ‭be‬ ‭efficient,‬‭that‬‭is‬‭should‬‭be‬‭able‬‭to‬‭use‬‭resources‬‭fully‬‭ensuring‬‭good‬
‭job processing, response time, turnaround time, etc.‬
‭-‬ ‭Must be maintainable.‬
‭-‬ ‭Must be small in terms of storage space on the disk.‬

*‭ ‬‭NB‬‭:‬‭Response‬‭time‬‭–‬‭the‬‭time‬‭that‬‭elapses‬‭from‬‭the‬‭moment‬‭an‬‭instruction‬‭is‬‭given‬
‭to the computer and the time that instruction is carried out.‬

‭ urn‬‭around‬‭time‬‭–‬‭the‬‭time‬‭taken‬‭from‬‭the‬‭moment‬‭a‬‭document‬‭is‬‭produced‬‭by‬‭a‬
T
‭computer and the moment it is used as an input document to that computer again.‬

‭ urnaround‬ ‭Document:‬ ‭a‬ ‭document‬ ‭produced‬ ‭by‬ ‭the‬‭computer‬‭and‬‭later‬‭used‬‭as‬


T
‭an input document to the same computer, e.g. electricity bill‬

‭ B‬‭.‬ ‭Most‬ ‭o perating‬ ‭systems‬ ‭are‬ ‭written‬ ‭in‬ ‭low‬ ‭level‬ ‭language.‬ ‭This‬ ‭is‬ ‭for‬ ‭them‬ ‭to‬
N
‭quickly‬ ‭coordinate‬ ‭computer‬ ‭activities‬ ‭since‬ ‭they‬ ‭will‬ ‭not‬ ‭be‬ ‭converted‬ ‭as‬ ‭they‬ ‭are‬
‭already‬ ‭in‬ ‭machine‬ ‭language‬ ‭o r‬ ‭less‬ ‭time‬ ‭is‬ ‭needed‬ ‭for‬‭conversion‬‭if‬‭the‬‭o perating‬
‭system‬ ‭is‬ ‭written‬ ‭in‬ ‭assembly‬ ‭language.‬ ‭The‬ ‭following‬ ‭must‬ ‭be‬ ‭considered‬ ‭when‬
‭buying an operating system:‬
‭-‬ ‭Hardware‬ ‭type‬ ‭and‬ ‭computer‬ ‭design‬ ‭e.g.‬ ‭windows‬ ‭o perating‬ ‭system‬ ‭works‬
‭well on IBM compatible machines.‬
‭-‬ ‭Applications intended for the computer e.g. accounting, stock taking, etc.‬
‭-‬ ‭Method‬ ‭o f‬ ‭communicating‬ ‭with‬ ‭the‬ ‭computer,‬ ‭that‬ ‭is,‬ ‭use‬ ‭o f‬ ‭few‬ ‭o r‬ ‭many‬
‭peripherals and terminals.‬
‭-‬ ‭Method of operating the computer e.g. multi-access, multi-programming, etc‬

‭ ypes Of Operating Systems‬


T
‭1.‬ ‭Single‬ ‭User‬ ‭Operating‬ ‭Systems‬‭:‬ ‭These‬ ‭are‬ ‭o perating‬ ‭systems‬ ‭that‬ ‭allow‬ ‭o ne‬
‭computer‬ ‭user‬ ‭at‬ ‭a‬ ‭time‬ ‭in‬ ‭an‬ ‭interactive‬ ‭mode,‬ ‭for‬ ‭example‬ ‭MS-DOS,‬ ‭CP/M,‬ ‭OS/2,‬
‭etc.‬
‭Advantages of Single user operating systems are‬‭:‬
‭-‬ ‭They are cheap to buy.‬
‭-‬ ‭They‬‭are‬‭interactive,‬‭that‬‭is,‬‭they‬‭allow‬‭a‬‭two‬‭way‬‭communication‬‭between‬‭the‬
‭user and the computer in a conversational mode.‬
‭-‬ ‭They ensure better security to data since they only allow one user at a time.‬
‭-‬ ‭They provide simple command language.‬
‭Disadvantages of Single user operating systems are‬‭:‬
‭-‬ ‭They are very slow in processing data.‬
‭-‬ ‭Most of the computers are dedicated to one task.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭80‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ ‭The commands are difficult to learn and to use.‬
‭-‬ ‭Commands are difficult to master.‬
‭NB‬‭-‬‭Control‬‭Programs‬‭:‬‭These‬‭are‬‭programs‬‭that‬‭monitor‬‭hardware‬‭o peration‬‭o n‬‭the‬
‭computer.‬
‭-‬ ‭Monitor‬ ‭(supervisor)‬ ‭programs‬‭:‬ ‭-‬ ‭These‬ ‭are‬ ‭programs‬ ‭that‬ ‭supervise‬ ‭and‬
‭manage hardware and software elements of the computer‬

‭ .‬ ‭Time‬ ‭sharing‬ ‭operating‬ ‭systems‬‭:‬ ‭This‬ ‭type‬ ‭o f‬ ‭o perating‬ ‭system‬ ‭allows‬ ‭many‬
2
‭users‬ ‭to‬ ‭use‬ ‭the‬‭same‬‭processor‬‭at‬‭a‬‭time,‬‭using‬‭the‬‭round‬‭robin‬‭method‬‭by‬‭use‬‭o f‬
‭time‬ ‭slices.‬ ‭In‬ ‭Round‬ ‭Robin,‬ ‭each‬‭user‬‭is‬‭given‬‭a‬‭fraction‬‭o f‬‭a‬‭second‬‭(time‬‭slice)‬‭to‬
‭use the processor so that all users seem not to be sharing the processor.‬
‭*NB:‬ ‭-‬ ‭Time‬ ‭slice:‬ ‭A‬ ‭brief‬ ‭period‬ ‭o f‬ ‭time‬ ‭during‬ ‭which‬ ‭a‬ ‭particular‬ ‭task‬ ‭(or‬
‭computer)‬ ‭is‬ ‭given‬ ‭control‬ ‭o f‬ ‭the‬ ‭microprocessor‬ ‭in‬ ‭a‬ ‭time-sharing‬ ‭multitasking‬
‭environment.‬ ‭A‬ ‭computer's‬ ‭processor‬ ‭is‬ ‭allocated‬ ‭to‬ ‭an‬ ‭application,‬ ‭usually‬
‭measured in milliseconds. Time slice is also called‬‭quantum‬‭.‬
‭Multitasking‬‭:‬ ‭It‬ ‭is‬‭the‬‭concurrent‬‭execution‬‭o f‬‭two‬‭o r‬‭more‬‭programs‬‭o n‬‭the‬‭same‬
‭computer‬ ‭by‬ ‭use‬ ‭o f‬ ‭time‬ ‭slices,‬ ‭doing‬ ‭the‬ ‭same‬ ‭job.‬ ‭For‬ ‭example,‬ ‭copying‬ ‭a‬ ‭graph‬
‭from‬ ‭Microsoft‬ ‭Excel‬ ‭to‬ ‭Microsoft‬ ‭Word.‬ ‭Thus‬ ‭the‬ ‭two‬ ‭programs‬ ‭will‬ ‭be‬ ‭running‬
‭concurrently, doing a related or same job.‬

‭ .‬ ‭Multi‬ ‭Access‬ ‭/‬ ‭Multi‬ ‭user‬ ‭operating‬ ‭systems‬‭:‬ ‭It‬ ‭is‬ ‭when‬ ‭many‬ ‭o nline‬ ‭users‬
3
‭access one processor at the same time to make use of multi-programming.‬

‭ .‬ ‭Multi-programming:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭two‬ ‭o r‬ ‭more‬ ‭programs‬ ‭(tasks)‬ ‭are‬ ‭being‬
4
‭processed‬‭(run)‬‭at‬‭the‬‭same‬‭time‬‭o n‬‭o ne‬‭computer‬‭by‬‭use‬‭o f‬‭time‬‭slices,‬‭for‬‭example‬
‭playing‬‭music‬‭while‬‭typing‬‭a‬‭document.‬‭Programs‬‭may‬‭take‬‭turns‬‭to‬‭make‬‭use‬‭o f‬‭the‬
‭processor,‬ ‭thus‬ ‭when‬ ‭o ne‬ ‭is‬ ‭using‬ ‭the‬ ‭CPU,‬ ‭o thers‬ ‭will‬ ‭be‬ ‭using‬ ‭the‬ ‭peripherals.‬ ‭It‬
‭uses interrupts to pass control from one program to another.‬

‭ .‬ ‭Multiprocessing:‬ ‭A‬ ‭type‬ ‭o f‬ ‭o perating‬ ‭system‬ ‭that‬ ‭allows‬ ‭o ne‬ ‭computer‬ ‭to‬ ‭have‬
5
‭two or more processors but sharing the same memory, e.g. dual core computers.‬

‭ .‬‭Batch‬‭Processing‬‭System‬‭:‬‭-‬‭A‬‭system‬‭in‬‭which‬‭data‬‭is‬‭collected‬‭over‬‭a‬‭long‬‭period‬
6
‭o f‬‭time,‬‭put‬‭in‬‭groups‬‭and‬‭processed‬‭at‬‭o ne‬‭go,‬‭without‬‭user‬‭interaction‬‭from‬‭start‬‭to‬
‭finish,‬‭as‬‭in‬‭payroll‬‭processing.‬‭Jobs‬‭can‬‭be‬‭entered‬‭at‬‭a‬‭remote‬‭terminal,‬‭that‬‭is,‬‭o n‬‭a‬
‭terminal‬‭far‬‭away‬‭from‬‭the‬‭host‬‭computer.‬‭Thus‬‭batch‬‭processing‬‭promotes‬‭Remote‬
‭Job‬‭Entry‬‭(RJE):‬‭which‬‭is‬‭the‬‭entering‬‭o f‬‭data‬‭into‬‭the‬‭computer‬‭through‬‭a‬‭terminal‬
‭far away from the host computer.‬
‭-‬ ‭For‬ ‭instance,‬ ‭a‬ ‭central‬ ‭computer‬ ‭can‬ ‭process‬ ‭batches‬ ‭o f‬ ‭cheques‬ ‭collected‬ ‭from‬
‭different‬ ‭branches,‬ ‭mostly‬ ‭during‬ ‭the‬ ‭night.‬ ‭If‬‭there‬‭are‬‭errors,‬‭the‬‭results‬‭will‬‭also‬
‭be‬‭wrong.‬‭Batch‬‭processing‬‭is‬‭very‬‭cheap‬‭to‬‭o perate‬‭and‬‭easy‬‭to‬‭run.‬‭Users‬‭can‬‭also‬
‭perform some other tasks while batch processing takes place.‬
‭-‬ ‭In‬ ‭batch‬ ‭processing,‬ ‭there‬ ‭is‬ ‭minimum‬ ‭o r‬ ‭no‬ ‭human‬ ‭intervention‬ ‭during‬ ‭data‬
‭processing‬ ‭period.‬ ‭It‬ ‭is‬ ‭used‬ ‭where‬ ‭large‬ ‭amounts‬ ‭o f‬ ‭data‬ ‭is‬ ‭processed‬‭and‬‭where‬
‭processing‬ ‭does‬ ‭not‬ ‭need‬ ‭to‬ ‭be‬ ‭done‬ ‭immediately,‬ ‭e.g.‬ ‭in‬ ‭Payroll‬ ‭processing,‬‭water‬
‭billing, electricity billing, telephone billing, clearance of cheques, etc).‬

‭ ayroll Processing‬
P
‭These‬ ‭calculate‬ ‭wages‬ ‭and‬ ‭print‬ ‭payslips.‬ ‭It‬ ‭h‬ ‭the‬ ‭following‬ ‭inputs,‬ ‭processes‬ ‭and‬
‭o utputs:‬
‭Inputs‬‭:‬ ‭employee‬ ‭details‬ ‭(rate‬ ‭o f‬ ‭pay,‬ ‭tax‬ ‭code,‬ ‭bank‬ ‭name,‬ ‭bank‬ ‭account‬ ‭number,‬
‭etc), number of hours worked, over time, etc.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭81‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ rocessing‬‭:‬‭Calculation‬‭o f‬‭Gross‬‭Salary,‬‭Net‬‭Salary,‬‭deductions,‬‭updating‬‭master‬‭file,‬
P
‭etc.‬
‭Outputs‬‭: printed payslips, updated master file, transfer‬‭to bank account, etc.‬

‭ illing systems‬
B
‭Used‬‭to‬‭create‬‭bills‬‭and‬‭invoices‬‭to‬‭customers.‬‭It‬‭has‬‭the‬‭following‬‭inputs,‬‭processing‬
‭and outputs:‬
‭Inputs‬‭:‬ ‭customer‬ ‭details‬ ‭(names,‬ ‭address,‬ ‭account‬ ‭numbers,‬ ‭etc),‬ ‭charge,‬ ‭previous‬
‭readings, new readings, bank account details, etc‬
‭Processing‬‭:‬ ‭calculating‬ ‭the‬ ‭number‬ ‭o f‬ ‭number‬ ‭o f‬ ‭total‬ ‭units,‬ ‭total‬ ‭cost,‬ ‭monthly‬
‭payments made, outstanding amount, etc.‬
‭Output‬‭: printed bill showing all details, updated‬‭customer file, etc.‬

‭Advantages of batch processing are as follows:‬


‭-‬ ‭It is less expensive to use.‬
‭-‬ ‭jobs‬‭can‬‭be‬‭processed‬‭when‬‭computer‬‭resources‬‭are‬‭less‬‭busy‬‭(e.g.‬‭during‬‭the‬
‭evening or at night);‬
‭-‬ ‭Processing does not need to be done with anyone present.‬
‭-‬ ‭Users do not need to be specialists in computers. It allows remote job entry.‬

‭Disadvantages of batch processing are as follows:‬


‭-‬ ‭Batch processing systems are not interactive.‬
‭-‬ ‭Data is processed after a long period of time.‬
‭-‬ ‭No action can be taken if anything wrong happens during processing.‬

‭ .‬ ‭Translators:‬ ‭-‬ ‭These‬ ‭are‬ ‭programs‬ ‭that‬ ‭convert‬ ‭source‬ ‭code‬ ‭to‬ ‭o bject‬ ‭code.‬
b
‭Translators‬‭are‬‭in‬‭three‬‭forms,‬‭which‬‭are‬‭interpreters‬‭,‬‭assemblers‬‭and‬‭compilers.‬
‭These will be covered in more detail under Programming Languages.‬

c‭ . Utility Programs‬‭:‬
‭These‬‭are‬‭programs‬‭used‬‭to‬‭perform‬‭specific,‬‭useful‬‭and‬‭frequently‬‭needed‬‭task‬‭in‬‭a‬
‭computer‬ ‭system.‬ ‭They‬ ‭usually‬ ‭have‬ ‭o ne‬ ‭single‬ ‭task‬ ‭to‬ ‭perform‬ ‭o n‬ ‭the‬ ‭computer‬
‭system. Utilities include the following:‬

i‭ .‬‭Virus‬‭Scan‬‭Utility:‬‭These‬‭are‬‭programs‬‭that‬‭protect‬‭computers‬‭from‬‭virus‬‭attacks,‬
‭for example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.‬

i‭ i.‬ ‭Sort‬ ‭Utilities:‬ ‭These‬‭are‬‭programs‬‭used‬‭to‬‭arrange‬‭data,‬‭files‬‭and‬‭records‬‭into‬‭a‬


‭specific‬‭o rdered‬‭sequence,‬‭for‬‭instance‬‭in‬‭ascending‬‭o r‬‭descending‬‭o rder‬‭o f‬‭a‬‭given‬
‭key.‬

‭iii. Debuggers:‬‭These are utilities used for assisting‬‭in correcting errors in programs.‬

i‭ v.‬‭Dump‬‭Utilities:‬‭These‬‭are‬‭programs‬‭that‬‭assist‬‭in‬‭copying‬‭data‬‭from‬‭main‬‭storage‬
‭to output devices and to other storage devices like the hard drive.‬

‭ .‬ ‭Editors:‬ ‭These‬ ‭are‬ ‭programs‬ ‭used‬ ‭to‬ ‭make‬ ‭changes‬ ‭to‬ ‭data‬ ‭already‬ ‭held‬ ‭in‬ ‭the‬
v
‭computer.‬

‭ i.‬‭Peripheral‬‭Transfer‬‭Utility:‬‭These‬‭are‬‭programs‬‭used‬‭to‬‭transfer‬‭data‬‭from‬‭o ne‬
v
‭peripheral device to another.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭82‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ii.‬ ‭System‬ ‭Status‬ ‭Utilities:‬ ‭These‬ ‭are‬ ‭programs‬ ‭that‬ ‭provide‬ ‭information‬ ‭o n‬ ‭the‬
v
‭state of files, memory, users and peripherals.‬

‭ iii.‬ ‭File‬ ‭Maintenance‬ ‭Utilities:‬ ‭These‬ ‭are‬‭programs‬‭used‬‭to‬‭reorganise‬‭programs‬


v
‭and to update them.‬

(‭ ‬‭d) Device Drivers:‬‭Programs that allows a device,‬‭e.g. printer to work on a given‬


‭o perating system/computer.‬

‭APPLICATION SOFTWARE‬
‭ his‬‭refers‬‭to‬‭programs‬‭and‬‭their‬‭documentation,‬‭designed‬‭to‬‭perform‬‭a‬‭specific‬‭task‬
T
‭for the user in daily life, like payroll processing, word processing, etc.‬
‭Integrated‬ ‭Package‬ ‭(Application‬ ‭suite)‬ ‭-‬ ‭a‬ ‭collection‬ ‭o f‬ ‭application‬ ‭programs‬
‭purchased‬ ‭as‬ ‭o ne‬ ‭package,‬ ‭for‬ ‭example‬ ‭Microsoft‬‭Office‬‭2010.‬‭It‬‭is‬‭a‬‭collection‬‭o f‬‭a‬
‭word‬ ‭processor,‬ ‭spreadsheet,‬ ‭database‬ ‭and‬ ‭presentation‬ ‭packages‬ ‭bought‬ ‭as‬ ‭o ne‬
‭package, for example, Microsoft Office 2010.‬

‭Advantages of Integrated Packages are:‬


‭-‬ ‭It‬ ‭is‬ ‭cheap‬ ‭to‬ ‭buy‬ ‭as‬ ‭compared‬ ‭to‬ ‭buying‬ ‭single‬ ‭application‬ ‭programs‬ ‭at‬ ‭a‬
‭time.‬
‭-‬ ‭Programs have been tried and tested and therefore are free from errors.‬
‭-‬ ‭Programs‬‭are‬‭designed‬‭in‬‭a‬‭similar‬‭way,‬‭making‬‭it‬‭easier‬‭to‬‭learn‬‭o thers‬‭if‬‭you‬
‭are able to use one of them.‬
‭-‬ ‭Programs‬ ‭are‬ ‭easier‬ ‭to‬ ‭use‬ ‭and‬ ‭to‬ ‭learn,‬ ‭for‬ ‭example,‬ ‭when‬ ‭designing‬ ‭a‬
‭database using Microsoft Access.‬
‭-‬ ‭Regular updates are provided on the internet or on disks.‬

‭Disadvantages of integrated packages are as follows:‬


‭-‬ ‭The‬ ‭user‬ ‭is‬ ‭forced‬ ‭to‬ ‭buy‬ ‭the‬ ‭incorporated‬ ‭packages‬ ‭even‬ ‭if‬ ‭he/she‬ ‭needs‬
‭o nly one of them.‬
‭-‬ ‭They are not tailored for individual user requirements.‬
‭-‬ ‭Organisations purchasing them have little or no control over their use.‬
‭-‬ ‭The packaged programs can only be modified by the programmers (owners).‬
‭-‬ ‭Most of the need regular updating, which may be expensive.‬
‭-‬ ‭They have many features that the users might never use yet they buy them.‬

‭ ethods of Acquiring Software‬


M
‭1.‬ ‭Off-the-Shelf/Generic:‬ ‭This‬ ‭refers‬ ‭to‬ ‭buying‬ ‭generalised‬ ‭software‬ ‭like‬ ‭Microsoft‬
‭Word‬ ‭from‬ ‭software‬ ‭vendors.‬‭Generalised‬‭( generic)‬‭software‬‭refers‬‭to‬‭application‬
‭programs‬ ‭designed‬ ‭for‬ ‭use‬ ‭in‬ ‭a‬ ‭number‬ ‭o f‬ ‭o rganisations‬ ‭without‬ ‭problems,‬ ‭for‬
‭example‬ ‭Microsoft‬ ‭Word.‬ ‭A‬ ‭software‬ ‭vendor‬ ‭is‬ ‭an‬ ‭o rganisation‬ ‭that‬ ‭specialises‬ ‭in‬
‭selling generic software.‬
‭Advantages of generic (Off-the-shelf) software:‬
‭-‬ ‭Cheaper‬ ‭than‬ ‭custom‬ ‭written‬ ‭(tailor‬ ‭made)‬ ‭packages‬ ‭as‬ ‭development‬ ‭costs‬
‭are spread over many users.‬
‭-‬ ‭the package is available immediately – no need to wait for development period‬
‭-‬ ‭Allows‬ ‭large‬ ‭scale‬ ‭sales‬ ‭which‬ ‭bring‬ ‭in‬ ‭considerable‬ ‭revenue‬ ‭which‬ ‭can‬ ‭be‬
‭used to enable a lot of development to be done.‬
‭-‬ ‭They are immediately available in shops.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭83‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ T ‭ hey are tried and tested and therefore are free from errors.‬
‭-‬ ‭Documentation‬ ‭is‬ ‭always‬ ‭provided‬ ‭in‬ ‭form‬ ‭o f‬ ‭manuals,‬ ‭user‬ ‭guides‬ ‭and‬
‭tutorials that may be in soft or hardcopy.‬
‭-‬ ‭Training courses can be available from other end-users.‬
‭-‬ ‭Technical support is always available from other users and from the internet.‬
‭-‬ ‭Other‬ ‭users‬ ‭o f‬ ‭the‬ ‭package‬ ‭can‬ ‭be‬ ‭consulted‬ ‭before‬ ‭purchasing‬ ‭o r‬ ‭when‬ ‭a‬
‭problem occurs.‬
‭-‬ ‭Upgrades are always available every year or two.‬
‭-‬ ‭It‬ ‭is‬ ‭easy‬ ‭to‬‭share‬‭files‬‭produced‬‭by‬‭the‬‭software‬‭with‬‭o thers‬‭as‬‭chances‬‭are‬
‭they also have the software available to open the file‬
‭-‬ ‭sharing‬‭o f‬‭files‬‭with‬‭o ther‬‭packages‬‭is‬‭usually‬‭easier‬‭since‬‭they‬‭are‬‭likely‬‭to‬‭be‬
‭compatible (e.g‬‭. Excel‬‭and‬‭Word‬‭)‬

‭Disadvantages of Generic Software:‬


‭-‬ ‭May not meet the individual needs of an organisation.‬
‭-‬ ‭May not run on the organisation’s hardware.‬
‭-‬ ‭May not interface with other software already in use in the organisation.‬
‭-‬ ‭Organisations purchasing them have little or no control over their usage.‬
‭-‬ ‭Organisations purchasing them have no right to modify them.‬
‭-‬ ‭The‬‭software‬‭can‬‭be‬‭very‬‭sophisticated‬‭and‬‭will‬‭usually‬‭include‬‭large‬‭sections‬
‭that you will never use (e.g. Excel or Word)‬
‭-‬ ‭may‬ ‭be‬ ‭very‬ ‭complex‬ ‭to‬ ‭learn‬ ‭because‬ ‭o f‬ ‭the‬ ‭complexity‬ ‭caused‬ ‭through‬
‭having unwanted features‬

‭ .‬ ‭Tailor-made‬ ‭Software‬ ‭(bespoke/user‬ ‭application‬ ‭software):‬ ‭These‬ ‭are‬


2
‭programs‬ ‭specifically‬ ‭designed‬ ‭to‬ ‭meet‬ ‭the‬ ‭unique‬ ‭needs‬ ‭o f‬ ‭o nly‬ ‭o ne‬‭o rganisation,‬
‭for‬‭example‬‭a‬‭bank.‬‭The‬‭o rganisation‬‭would‬‭employ‬‭o r‬‭hire‬‭an‬‭analyst‬‭/‬‭programmer‬
‭who‬ ‭will‬ ‭first‬ ‭asses‬ ‭the‬ ‭needs‬ ‭o f‬ ‭the‬ ‭o rganisation‬ ‭before‬ ‭designing‬ ‭a‬‭program‬‭that‬
‭will solve the problems of the organisation.‬
‭Advantages of Tailor-made software‬
‭-‬ ‭Easier and more intuitive to use.‬
‭-‬ ‭Much‬ ‭better‬ ‭customer‬ ‭support‬ ‭since‬ ‭they‬ ‭will‬ ‭be‬ ‭in‬ ‭direct‬ ‭contact‬ ‭with‬ ‭the‬
‭software designers.‬
‭-‬ ‭Specifically‬‭designed‬‭for‬‭the‬‭application‬‭and‬‭therefore‬‭more‬‭efficient‬‭and‬‭will‬
‭o nly contain the features wanted by the user.‬
‭-‬ ‭can‬ ‭be‬ ‭customised‬ ‭to‬ ‭interface‬ ‭with‬ ‭all‬ ‭o ther‬ ‭software‬ ‭within‬ ‭the‬ ‭company‬
‭thus preventing software clashes‬
‭-‬ ‭easier‬ ‭to‬ ‭use‬ ‭since‬ ‭very‬ ‭specific‬ ‭and‬ ‭the‬ ‭writers‬ ‭o f‬ ‭the‬‭software‬‭can‬‭also‬‭be‬
‭involved‬ ‭in‬ ‭the‬ ‭training‬ ‭o f‬ ‭staff‬ ‭which‬ ‭will‬ ‭be‬ ‭geared‬ ‭towards‬ ‭their‬
‭requirements‬
‭-‬ ‭can be modified/updated as the company’s requirements change‬

‭Disadvantages of Tailor-made software:‬


‭-‬ ‭It is very expensive to develop.‬
‭-‬ ‭They take too long to develop and to implement.‬
‭-‬ ‭If‬ ‭you‬‭pick‬‭the‬‭wrong‬‭developer‬‭you‬‭could‬‭end‬‭up‬‭with‬‭an‬‭application‬‭that‬‭is‬
‭unstable, unreliable and full of bugs‬
‭-‬ ‭very‬ ‭dependent‬ ‭o n‬ ‭the‬ ‭suppliers‬ ‭o f‬ ‭the‬ ‭software;‬ ‭if‬ ‭they‬ ‭go‬ ‭o ut‬ ‭o f‬‭business‬
‭there will be little or no support if problems occur‬
‭-‬ ‭less likely to be as well developed/tested as off-the-shelf software‬
‭-‬ ‭difficult to tell how good the final software package will be‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭84‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

*‭ ‬‭NB‬‭:‬ ‭A‬ ‭programmer‬ ‭is‬ ‭a‬ ‭person‬ ‭who‬ ‭specialises‬ ‭in‬ ‭designing,‬ ‭coding‬ ‭and‬ ‭testing‬
‭computer programs.‬
‭Software‬ ‭House‬ ‭is‬ ‭an‬ ‭o rganisation‬ ‭that‬ ‭specialises‬ ‭is‬ ‭developing‬ ‭software;‬ ‭this‬
‭includes both generic and tailor-made.‬
‭Special‬ ‭Purpose‬ ‭Application‬ ‭Software‬‭:‬ ‭-‬ ‭These‬ ‭are‬ ‭programs‬ ‭designed‬ ‭for‬ ‭o ne‬
‭specific business purpose, for example Pastel for accounting purposes.‬

‭Advantages of Off-the-Shelf Software Over tailor-made software:‬


‭-‬ ‭Off‬ ‭-‬ ‭the‬ ‭-‬ ‭self‬ ‭software‬ ‭is‬ ‭cheaper‬ ‭to‬ ‭buy‬ ‭while‬ ‭tailor-made‬ ‭software‬ ‭is‬
‭expensive.‬
‭-‬ ‭Off-the-Shelf‬‭software‬‭has‬‭been‬‭tried‬‭and‬‭tested‬‭hence‬‭free‬‭from‬‭errors‬‭while‬
‭tailor-made software may have some errors.‬
‭-‬ ‭Off-the-Shelf‬ ‭software‬ ‭is‬ ‭easier‬ ‭and‬ ‭faster‬ ‭to‬ ‭implement‬ ‭while‬ ‭tailor‬ ‭made‬
‭software takes long to implement.‬
‭-‬ ‭Off-the-Shelf‬ ‭software‬ ‭is‬ ‭used‬ ‭by‬ ‭many‬ ‭o rganisations;‬ ‭therefore‬ ‭users‬ ‭can‬
‭share‬‭information‬‭o n‬‭its‬‭usage‬‭while‬‭tailor-made‬‭software‬‭is‬‭o nly‬‭used‬‭by‬‭o ne‬
‭o rganisation.‬
‭-‬ ‭Off-the-Shelf‬ ‭software‬ ‭has‬ ‭regular‬ ‭updates‬ ‭available‬ ‭for‬ ‭download‬ ‭o n‬ ‭the‬
‭internet while tailor-made software does not.‬

‭Advantages of tailor made software as compared to Generic Software:‬


‭-‬ ‭Tailor-made‬‭software‬‭is‬‭designed‬‭to‬‭meet‬‭the‬‭requirements‬‭o f‬‭an‬‭o rganisation‬
‭while‬ ‭Off-the-Shelf‬ ‭software‬ ‭might‬ ‭not‬ ‭meet‬ ‭the‬ ‭needs‬ ‭o f‬ ‭an‬ ‭individual‬
‭company.‬
‭-‬ ‭Organisations‬ ‭have‬ ‭full‬ ‭control‬ ‭over‬ ‭tailor-made‬ ‭software‬ ‭as‬ ‭compared‬ ‭to‬
‭o ff-the-shelf software which is controlled by the programmers.‬

‭ ypes of Application Software:‬


T
‭These include:‬
‭1. Word Processing Packages:‬
‭These‬ ‭are‬ ‭application‬ ‭packages‬ ‭used‬ ‭for‬ ‭creating,‬ ‭editing‬ ‭and‬ ‭formatting‬ ‭text‬
‭documents‬ ‭like‬ ‭letters‬ ‭and‬ ‭reports.‬ ‭Examples‬ ‭o f‬ ‭Word‬‭Processing‬‭packages‬‭include‬
‭Microsoft‬ ‭Office‬ ‭Word,‬ ‭WordPerfect,‬ ‭WordPro,‬ ‭Notepad,‬ ‭etc.‬ ‭Word‬ ‭processing‬
‭packages have the following‬‭advantages over the typewriter‬‭:‬
‭-‬ ‭Produces more attractive documents.‬
‭-‬ ‭Word processors are less noise than typewriters.‬
‭-‬ ‭Documents‬ ‭can‬ ‭be‬ ‭edited‬ ‭and‬ ‭formatted‬ ‭before‬ ‭printing,‬ ‭which‬ ‭reduces‬
‭spelling and other typing mistakes on printed documents.‬
‭-‬ ‭Typed documents can be stored in the computer for future use.‬
‭-‬ ‭Document‬ ‭layout‬ ‭can‬ ‭be‬ ‭viewed‬ ‭o n‬ ‭the‬ ‭screen‬ ‭before‬ ‭printing‬ ‭and‬ ‭can‬ ‭be‬
‭changed easily.‬
‭-‬ ‭A word processed document can be printed more than once.‬
‭-‬ ‭Other‬ ‭text‬ ‭and‬ ‭diagrams‬ ‭can‬ ‭be‬ ‭added‬ ‭without‬ ‭the‬ ‭need‬ ‭to‬ ‭retype‬ ‭the‬
‭document.‬
‭-‬ ‭Word‬ ‭processors‬ ‭can‬ ‭move‬ ‭some‬ ‭parts‬ ‭o f‬ ‭text‬ ‭to‬ ‭another‬ ‭part‬ ‭o f‬ ‭the‬
‭document easily (using copy/cut and Paste feature).‬
‭-‬ ‭They have the ability to delete words, sentences and paragraphs neatly.‬
‭-‬ ‭They are less manual than typewriters.‬

‭Features of Word processing Packages‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭85‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ a‭ bility to set the page size and page orientation (portrait/landscape)‬
‭-‬ ‭ability to change font style and font size (e.g.‬‭arial,‬‭courier, times new roman‬‭, etc.)‬
‭-‬ ‭ability to change margins (top, bottom and sides)‬
‭-‬ ‭page format (e.g. paragraphs, columns, etc.)‬
‭-‬ ‭importing‬‭text,‬‭graphics‬‭and‬‭pictures‬‭into‬‭the‬‭document‬‭body‬‭from‬‭o ther‬‭packages‬
‭like Microsoft PowerPoint and Excel.‬
-‭ ‬ ‭inserting and deleting text‬
‭-‬ ‭cut‬‭and‬‭paste/copy‬‭and‬‭paste‬‭(to‬‭prevent‬‭the‬‭need‬‭to‬‭re-type‬‭sections‬‭o f‬‭text‬‭o r‬‭to‬
‭move/remove text)‬
-‭ ‬ ‭search and replace words‬
‭-‬ ‭word wrap (e.g. auto adjust a line to fit into paragraph alignment such as straight‬
‭-‬ ‭file management (create/delete/move/search for files)‬
‭-‬ ‭headers and footers and the automatic numbering of pages‬
‭-‬ ‭graphics (embed drawings and graphs into the document)‬
‭-‬ ‭use macros‬
‭-‬ ‭merge (merge text files from one file into another e.g. mail merge)‬
‭-‬ ‭ability to send documents to a printer‬
‭-‬ ‭carry out a word count on the document‬
‭-‬ ‭add and manipulate tables in the main body of the document‬
‭-‬ ‭windows (edit 2 or more documents at the same time)‬
‭-‬ ‭WYSIWYG‬ ‭(what‬ ‭you‬ ‭see‬ ‭is‬ ‭what‬ ‭you‬ ‭get)‬ ‭–‬ ‭preview‬ ‭document‬ ‭to‬ ‭see‬ ‭how‬ ‭it‬ ‭will‬
‭look when printed‬
-‭ ‬ ‭spell checkers, language check and thesaurus‬
‭-‬ ‭Simple‬ ‭translation‬ ‭from‬ ‭o ne‬ ‭language‬ ‭to‬ ‭another;‬ ‭for‬ ‭example,‬ ‭from‬ ‭English‬ ‭to‬
‭French.‬

*‭ ‬‭NB‬‭:‬‭Editing‬‭:‬‭the‬‭process‬‭o f‬‭correcting‬‭mistakes‬‭in‬‭a‬‭document,‬‭for‬‭example,‬‭spelling‬
‭mistakes.‬
‭Formatting‬‭:‬ ‭making‬ ‭a‬ ‭document‬ ‭look‬ ‭more‬ ‭attractive‬ ‭by‬ ‭bolding,‬ ‭underlining,‬
‭inserting borders, etc‬

‭ .‬ ‭Spreadsheet‬ ‭Packages:‬ ‭These‬ ‭are‬ ‭application‬ ‭programs‬ ‭used‬ ‭to‬ ‭manage‬ ‭and‬
2
‭analyse‬ ‭statistical,‬ ‭numeric‬ ‭and‬ ‭financial‬ ‭data,‬ ‭for‬ ‭example‬ ‭Microsoft‬ ‭Office‬ ‭Excel,‬
‭Lotus 1-2-3, SuperCalc, etc. The structure of a spreadsheet is as follows:‬

‭Features of Spreadsheet packages‬


‭-‬ ‭Can format text (Bold, underline, …)‬
‭-‬ ‭Can change font size and font type‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭86‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ U ‭ ses‬ ‭functions/‬ ‭formulae‬ ‭to‬ ‭make‬‭calculations‬‭o n‬‭data.‬‭The‬‭functions‬‭can‬‭be‬
‭user-defined or in-built functions‬
‭-‬ ‭Ability to inset boards on cells‬
‭-‬ ‭Can import and export text‬
‭-‬ ‭Can create graphs on given data, e.g. column graphs, pie charts, etc‬
‭-‬ ‭it‬ ‭is‬ ‭made‬ ‭up‬ ‭o f‬ ‭columns‬ ‭and‬ ‭rows;‬ ‭each‬ ‭row‬ ‭is‬‭identified‬‭by‬‭a‬‭number‬‭and‬
‭each column is identified with a letter (or letters)‬
‭-‬ ‭can use‬‭Autofill‬‭feature‬
‭-‬ ‭Each‬‭cell‬‭is‬‭identified‬‭by‬‭its‬‭column‬‭id‬‭and‬‭row‬‭id‬‭e.g.‬‭A4,‬‭ET300‬‭etc.‬‭Cells‬‭can‬
‭be given as cell ranges, e.g A4: G4.‬
‭-‬ ‭a‬ ‭cell‬ ‭may‬ ‭contain‬ ‭a‬ ‭label‬ ‭(text‬ ‭entry‬ ‭such‬ ‭as‬ ‭Surname,‬ ‭Date‬ ‭Of‬‭Birth,..)‬‭o r‬‭a‬
‭value‬ ‭(which‬ ‭can‬ ‭be‬ ‭a‬ ‭number,‬ ‭a‬ ‭date,‬ ‭a‬ ‭formula,‬ ‭result‬ ‭o f‬ ‭a‬ ‭calculation,‬ ‭o r‬
‭currency)‬
‭-‬ ‭the‬‭cursor‬‭identifies‬‭the‬‭current‬‭cell‬‭selected;‬‭it‬‭is‬‭possible‬‭to‬‭click‬‭o n‬‭to‬‭a‬‭cell‬
‭and‬ ‭a‬ ‭“+”‬ ‭sign‬ ‭appears‬ ‭in‬ ‭the‬ ‭bottom‬ ‭right‬ ‭hand‬ ‭corner;‬ ‭by‬ ‭dragging‬ ‭the‬
‭formula down it is possible to‬‭replicate‬‭it in other‬‭cells‬
‭-‬ ‭etc……‬

‭Problems Associated With Spreadsheets:‬


‭-‬ ‭capacity‬ ‭(i.e.‬ ‭maximum‬ ‭number‬ ‭o f‬ ‭rows‬ ‭and‬ ‭columns)‬ ‭can‬ ‭be‬ ‭limiting‬ ‭when‬
‭dealing with large data sets‬
‭-‬ ‭security‬ ‭issues‬ ‭in‬ ‭some‬ ‭spreadsheets‬ ‭(i.e.‬‭if‬‭you‬‭can‬‭o pen‬‭a‬‭spreadsheet‬‭you‬
‭can also change any part of it; this can lead to fraud‬
‭-‬ ‭lack‬ ‭o f‬ ‭concurrency;‬ ‭usually‬ ‭o nly‬ ‭o ne‬ ‭person‬ ‭can‬ ‭work‬ ‭o n‬ ‭a‬ ‭spreadsheet‬‭at‬
‭any‬ ‭given‬ ‭time‬ ‭(databases‬ ‭are‬ ‭better‬ ‭in‬ ‭this‬‭aspect‬‭since‬‭they‬‭can‬‭usually‬‭be‬
‭o pened by more than one user at a time)‬
‭-‬ ‭because‬‭o f‬‭their‬‭structure‬‭it‬‭is‬‭easy‬‭to‬‭enter‬‭an‬‭error‬‭(whether‬‭o n‬‭purpose‬‭o r‬
‭by‬ ‭mistake)‬ ‭by‬‭entering‬‭data‬‭in‬‭the‬‭wrong‬‭cells‬‭o r‬‭dependencies‬‭among‬‭cells‬
‭incorrectly applied‬

‭3. Presentation Packages‬‭:‬


‭-‬ ‭These‬ ‭are‬ ‭programs‬ ‭used‬ ‭for‬ ‭designing‬ ‭slides‬ ‭for‬ ‭a‬ ‭presentation‬ ‭to‬ ‭an‬
‭audience, for example Microsoft Office PowerPoint, Lotus Smart Suite, etc.‬
‭-‬ ‭Presentation‬ ‭packages‬ ‭include‬ ‭text,‬ ‭pictures,‬ ‭sound,‬ ‭animation,‬ ‭graphics‬ ‭and‬
‭tables, thus being multimedia.‬
‭-‬ ‭Presentations are colourful and attractive.‬
‭-‬ ‭Speakers and projectors are needed.‬
‭-‬ ‭Presentation packages have the following‬‭features‬‭:‬
‭●‬ ‭Have Clip art. Can accommodate images and graphics.‬
‭●‬ ‭Can use sound, video and animation.‬
‭●‬ ‭Incorporate Word Art.‬
‭●‬ ‭Have facility to insert charts and graphs.‬
‭*NB:‬‭Animation:‬‭-‬‭Creating‬‭illusion‬‭o f‬‭moving‬‭sequence‬‭using‬‭a‬‭series‬‭o f‬‭still‬‭images‬
‭as done in movies and cartoons.‬

‭ .‬ ‭Database‬ ‭Packages‬ ‭(DBMS):‬ ‭Refers‬ ‭to‬ ‭programs‬ ‭used‬ ‭to‬ ‭create‬ ‭and‬ ‭maintain‬
4
‭databases for a specific application area.‬
‭They‬ ‭are‬‭used‬‭for‬‭maintaining‬‭and‬‭providing‬‭interface‬‭been‬‭users‬‭and‬‭the‬‭database‬
‭and to interface the database and other application programs.‬
‭Examples‬ ‭o f‬ ‭database‬ ‭packages‬ ‭include‬ ‭Microsoft‬ ‭Office‬ ‭Access,‬ ‭Oracle,‬ ‭Dbase‬ ‭IV,‬
‭MySQL, etc‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭87‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ roperties/features of databases‬
P
‭Most database packages have the following features:‬
‭(a)‬ ‭Tables‬‭:‬‭These‬‭are‬‭equivalent‬‭to‬‭files‬‭and‬‭therefore‬‭are‬‭used‬‭to‬‭store‬‭data.‬
‭The‬ ‭data‬ ‭is‬ ‭stored‬ ‭in‬ ‭rows‬ ‭and‬ ‭columns.‬ ‭Each‬ ‭row‬ ‭in‬ ‭a‬ ‭table‬ ‭is‬ ‭called‬ ‭a‬
‭record‬ ‭which‬‭is‬‭made‬‭up‬‭o f‬‭a‬‭number‬‭o f‬‭fields‬‭(columns‬‭in‬‭the‬‭table).‬‭The‬
‭data‬ ‭type‬ ‭in‬ ‭the‬ ‭fields‬ ‭is‬ ‭usually‬ ‭either‬ ‭text,‬ ‭numeric‬ ‭o r‬ ‭date/time.‬ ‭Most‬
‭databases‬‭contain‬‭a‬‭number‬‭o f‬‭tables‬‭which‬‭are‬‭usually‬‭linked‬‭together‬‭in‬
‭some way.‬
‭(b)‬ ‭Forms‬‭:‬ ‭Forms‬ ‭are‬ ‭commonly‬ ‭called‬ ‭data‬ ‭entry‬ ‭screens‬ ‭since‬ ‭they‬‭are‬‭the‬
‭user‬ ‭interface‬ ‭which‬ ‭allows‬ ‭data‬ ‭in‬ ‭the‬ ‭tables‬ ‭to‬ ‭be‬ ‭viewed,‬ ‭entered‬ ‭o r‬
‭edited.‬ ‭Forms‬ ‭permit‬ ‭the‬ ‭control‬ ‭o f‬ ‭how‬ ‭o ther‬ ‭users‬ ‭interact‬ ‭with‬ ‭the‬
‭information‬‭in‬‭the‬‭database‬‭e.g.‬‭o nly‬‭allow‬‭certain‬‭fields‬‭to‬‭be‬‭seen‬‭o r‬‭o nly‬
‭allow‬ ‭certain‬ ‭o perations‬ ‭to‬ ‭be‬ ‭carried‬ ‭o ut‬ ‭.‬ ‭This‬ ‭subsequently‬ ‭helps‬ ‭the‬
‭protection of the information and also ensures it is entered correctly‬
‭(c)‬ ‭Reports‬‭:‬ ‭Reports‬ ‭are‬ ‭produced‬ ‭as‬ ‭a‬ ‭result‬ ‭o f‬ ‭questions‬ ‭such‬ ‭as‬
‭“date>=01/01/1975”.‬ ‭The‬ ‭data‬ ‭o n‬ ‭report‬ ‭is‬ ‭extracted‬ ‭from‬ ‭queries‬ ‭o r‬
‭tables‬ ‭as‬ ‭per‬ ‭user‬ ‭requirement.‬ ‭They‬ ‭display‬ ‭certain‬ ‭required‬ ‭data‬ ‭as‬
‭needed‬‭by‬‭the‬‭user,‬‭e.g.‬‭after‬‭searching‬‭o r‬‭filtering‬‭o f‬‭data.‬‭Reports‬‭can‬‭be‬
‭printed‬ ‭o ut‬ ‭as‬ ‭hardcopy,‬ ‭o r‬ ‭viewed‬ ‭o n‬ ‭the‬ ‭screen‬ ‭o r‬ ‭exported‬ ‭(e.g.‬ ‭to‬ ‭a‬
‭word processor, an email message, etc.).‬
‭(d)‬ ‭Queries‬‭:‬ ‭Queries‬ ‭are‬ ‭questions‬ ‭that‬ ‭request‬‭certain‬‭data‬‭from‬‭tables,‬‭e.g,‬
‭Amount‬ ‭<200.‬ ‭It‬ ‭can‬ ‭also‬ ‭be‬ ‭an‬‭instruction‬‭to‬‭search‬‭data‬‭which‬‭meets‬‭a‬
‭certain‬‭criteria‬‭from‬‭table‬‭and‬‭display‬‭it‬‭o n‬‭the‬‭screen‬‭in‬‭form‬‭o f‬‭another‬
‭table‬‭created‬‭from‬‭the‬‭o riginal‬‭table.‬‭Most‬‭commonly‬‭allow‬‭information‬‭to‬
‭be‬ ‭retrieved‬ ‭from‬ ‭tables.‬ ‭They‬ ‭also‬ ‭allow‬ ‭filtering‬ ‭so‬ ‭o nly‬ ‭the‬ ‭records‬
‭required are seen.‬
‭(e)‬ ‭Macros‬
‭A‬ ‭macro‬ ‭is‬ ‭a‬ ‭name‬ ‭o r‬ ‭key‬ ‭that‬ ‭represents‬ ‭a‬ ‭series‬ ‭o f‬ ‭commands‬ ‭o r‬ ‭key‬
‭strokes.‬‭Many‬‭applications‬‭allow‬‭single‬‭word‬‭o r‬‭single‬‭nominated‬‭key‬‭o n‬‭a‬
‭keyboard‬ ‭to‬ ‭perform‬ ‭a‬ ‭whole‬ ‭series‬ ‭o f‬ ‭actions.‬ ‭Macros‬ ‭can‬ ‭be‬ ‭either‬
‭written‬ ‭as‬ ‭required‬ ‭and‬ ‭then‬ ‭stored‬‭o r‬‭stored‬‭in‬‭a‬‭library‬‭for‬‭future‬‭use.‬
‭Macros‬‭can‬‭be‬‭very‬‭sophisticated‬‭and‬‭save‬‭the‬‭o perator‬‭a‬‭lot‬‭o f‬‭time.‬‭For‬
‭example,‬ ‭the‬ ‭name‬ ‭and‬ ‭address‬ ‭in‬ ‭a‬ ‭word‬ ‭processor‬ ‭could‬ ‭be‬ ‭set‬ ‭up‬‭by‬
‭pressing‬ ‭key‬ ‭F1‬ ‭and‬ ‭the‬ ‭system‬ ‭brings‬ ‭information‬ ‭from‬ ‭a‬ ‭related‬
‭database‬

‭ .‬‭Graphics‬‭Packages:‬‭Refers‬‭to‬‭programs‬‭used‬‭to‬‭create‬‭and‬‭edit‬‭graphs,‬‭diagrams,‬
5
‭drawings,‬ ‭charts‬ ‭and‬ ‭plans‬ ‭for‬ ‭buildings,‬ ‭for‬ ‭example‬ ‭Microsoft‬ ‭Paint,‬ ‭Harvard‬
‭Graphics,‬ ‭Corel‬ ‭Draw,‬ ‭Real‬ ‭Draw,‬ ‭etc.‬ ‭Computer‬ ‭graphics‬ ‭are‬ ‭images‬ ‭designed‬ ‭for‬
‭logos,‬ ‭commercial‬ ‭and‬ ‭news‬ ‭inserts‬ ‭during‬ ‭television‬ ‭advertisements‬ ‭o r‬
‭transmission.‬

‭ .‬‭Communication‬‭Software:‬‭These‬‭are‬‭programs‬‭that‬‭allow‬‭users‬‭to‬‭communicate‬
6
‭o n‬‭networked‬‭computers‬‭and‬‭to‬‭log‬‭o n‬‭to‬‭the‬‭internet,‬‭for‬‭example‬‭TCP/IP‬‭software,‬
‭Client – server software, e-mails, etc.‬
‭*‬‭NB‬‭:‬‭-‬‭Log‬‭On‬‭:‬‭to‬‭provide‬‭a‬‭username‬‭and‬‭password‬‭for‬‭the‬‭user‬‭to‬‭gain‬‭access‬‭to‬‭a‬
‭computer or computer network.‬

‭ .‬‭Desktop‬‭Publishing‬‭(DTP)‬‭Packages:‬‭It‬‭is‬‭an‬‭extension‬‭o f‬‭word‬‭processors‬‭that‬
7
‭incorporates‬ ‭images‬ ‭and‬ ‭text‬ ‭for‬ ‭creation‬ ‭o f‬‭attractive‬‭and‬‭professional‬‭documents‬
‭for‬ ‭publication‬ ‭purposes.‬ ‭Examples‬ ‭o f‬ ‭DTP‬ ‭packages‬ ‭include‬ ‭Microsoft‬ ‭Publisher,‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭88‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ageMaker‬ ‭and‬ ‭QuarkXPress.‬ ‭DTP‬ ‭is‬ ‭used‬ ‭to‬‭create‬‭brochures,‬‭magazines,‬‭wedding‬
P
‭cards and newsletters.‬
‭Features of DTP include:‬
‭-‬ ‭They have a graphic program for inserting graphics in the document.‬
‭-‬ ‭They have a page composition program.‬
‭-‬ ‭They incorporate columns on one page.‬
‭-‬ ‭They have frames for positioning texts and graphics.‬
‭-‬ ‭They‬ ‭have‬ ‭templates‬ ‭used‬ ‭for‬ ‭recording‬ ‭document‬ ‭properties‬ ‭like‬‭page‬‭size,‬
‭margins, etc.‬
‭-‬ ‭They‬ ‭have‬ ‭style‬ ‭sheets‬ ‭used‬ ‭for‬ ‭making‬ ‭consistent‬ ‭main‬ ‭texts,‬ ‭headings‬ ‭and‬
‭subheadings.‬

‭ equirements for DTP:‬


R
‭(a)‬ ‭A‬ ‭Scanner‬‭:‬ ‭-‬ ‭for‬ ‭capturing‬ ‭images‬ ‭o r‬ ‭hand‬ ‭drawings‬ ‭o n‬ ‭paper,‬ ‭for‬ ‭example‬
‭photographs‬
‭(b)‬ ‭High‬ ‭Resolution‬ ‭Monitor‬ ‭with‬ ‭graphics‬ ‭capabilities:‬ ‭-‬ ‭For‬ ‭viewing‬ ‭publication‬
‭during design stage.‬
‭(c)‬‭Colour Printer‬‭: For printing high quality and‬‭colourful documents.‬
‭(d)‬‭Digital‬‭c amera/webcam/cell-phone‬‭with‬‭a‬‭c amera‬‭:‬‭-‬‭for‬‭taking‬‭and‬‭storage‬‭o f‬
‭photographs that will be incorporated into the computer.‬
‭(e)‬‭Keyboard‬‭: For typing in text‬
‭(f)‬‭Mouse‬‭: - For adjusting size of pictures and for‬‭drawing purposes.‬
‭(g)‬‭Desktop Publishing (DTP) software‬‭.‬

‭Advantages of Desktop Publishing:‬


‭-‬ ‭Users‬ ‭have‬ ‭more‬ ‭control‬ ‭over‬ ‭text‬ ‭layout‬ ‭compared‬ ‭to‬ ‭word‬ ‭processors‬
‭especially over formatting and layout of text and images.‬
‭-‬ ‭Lots of different files can be brought together on the same document.‬
‭-‬ ‭Produces‬ ‭colourful‬ ‭and‬ ‭attractive‬ ‭documents‬ ‭for‬ ‭commercial‬ ‭purposes‬ ‭like‬
‭brochures.‬

‭Differences Between DTP and Word Processors‬


‭-‬ ‭most‬‭word‬‭processors‬‭force‬‭users‬‭to‬‭work‬‭o n‬‭a‬‭document‬‭in‬‭a‬‭linear‬‭fashion‬
‭(i.e.‬ ‭paragraph‬ ‭by‬ ‭paragraph‬ ‭and‬ ‭page‬ ‭by‬ ‭page);‬ ‭with‬ ‭DTP‬ ‭it‬ ‭is‬ ‭possible‬ ‭to‬
‭place‬‭elements‬‭o n‬‭the‬‭page‬‭and‬‭then‬‭move‬‭them‬‭around‬‭as‬‭you‬‭wish‬‭to‬‭create‬
‭the desired product.‬
‭-‬ ‭elements‬ ‭repeated‬ ‭throughout‬ ‭a‬ ‭document‬ ‭(e.g.‬ ‭a‬ ‭company‬ ‭logo)‬ ‭can‬ ‭be‬
‭placed‬‭in‬‭master‬‭pages‬‭rather‬‭than‬‭setting‬‭up‬‭each‬‭page‬‭individually‬‭as‬‭would‬
‭be the case with a word processor.‬
‭-‬ ‭Text‬‭is‬‭usually‬‭imported‬‭from‬‭a‬‭word‬‭processor‬‭o r‬‭is‬‭typed‬‭into‬‭the‬‭document‬
‭directly‬ ‭using‬ ‭a‬ ‭frame‬‭.‬ ‭This‬ ‭allows‬ ‭you‬ ‭to‬ ‭create‬ ‭the‬ ‭layout‬ ‭first,‬ ‭link‬ ‭the‬
‭frames‬‭together‬‭and‬‭add‬‭the‬‭text‬‭into‬‭the‬‭frames‬‭later‬‭(e.g.‬‭in‬‭newsletters‬‭and‬
‭magazines‬ ‭where‬ ‭layouts‬ ‭are‬ ‭created‬ ‭before‬ ‭any‬ ‭o f‬ ‭the‬ ‭actual‬ ‭text‬ ‭becomes‬
‭available).‬

‭ .‬ ‭Authoring‬ ‭Packages‬ ‭(Authorware):‬ ‭Software‬ ‭that‬ ‭can‬ ‭be‬ ‭used‬ ‭to‬ ‭write‬
8
‭interactive,‬ ‭hypertext‬ ‭o r‬ ‭multimedia‬ ‭computer‬ ‭programs‬ ‭without‬ ‭the‬ ‭technically‬
‭demanding‬ ‭task‬ ‭o f‬ ‭computer‬ ‭programming.‬ ‭Also‬ ‭used‬ ‭in‬ ‭multimedia‬‭presentations.‬
‭These‬ ‭programs‬ ‭can‬ ‭be‬ ‭used‬ ‭for‬ ‭developing‬ ‭databases‬ ‭and‬ ‭material‬ ‭for‬ ‭Computer‬
‭Aided Instruction (CAI).‬
‭Authoring‬ ‭tools‬ ‭require‬ ‭less‬‭technical‬‭knowledge‬‭to‬‭master‬‭and‬‭are‬‭usually‬‭used‬‭for‬
‭applications‬‭that‬‭present‬‭a‬‭mixture‬‭o f‬‭text,‬‭graphics,‬‭and‬‭audio/music‬‭files.‬‭Authoring‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭89‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
t‭ ools‬‭usually‬‭allow‬‭the‬‭creation‬‭o f‬‭the‬‭actual‬‭required‬‭application‬‭by‬‭linking‬‭together‬
‭objects‬ ‭which‬ ‭can‬ ‭be‬ ‭text,‬ ‭graphics,‬ ‭music‬ ‭file,‬ ‭etc.‬ ‭By‬ ‭defining‬ ‭the‬ ‭relationship‬
‭between‬‭objects‬‭it is possible to produce very useful‬‭and eye catching applications.‬

(‭ 9)‬‭Web‬‭Browsers‬‭:‬‭Software‬‭used‬‭to‬‭o pen‬‭web‬‭pages‬‭o n‬‭the‬‭internet,‬‭examples‬‭are:‬


‭Mozilla Firefox, Microsoft Internet Explorer, Safari, Opera, etc.‬

(‭ 10)‬‭Search‬‭Engines‬‭:‬‭These‬‭are‬‭packages‬‭used‬‭for‬‭searching‬‭data‬‭for‬‭the‬‭user‬‭from‬
‭the internet, e.g. google, yahoo, etc.‬

*‭ ‬‭NB‬‭:‬ ‭-‬ ‭Specialist‬ ‭Packages‬ ‭for‬ ‭Business:‬ ‭These‬ ‭are‬ ‭packages‬ ‭for‬ ‭use‬ ‭in‬ ‭a‬ ‭specific‬
‭business environment, for example, Pastel for accounting purposes.‬
‭*‬‭NB‬‭:‬‭-‬‭Install‬‭:‬‭-‬‭to‬‭add‬‭programs‬‭to‬‭the‬‭computer.‬‭Therefore‬‭to‬‭uninstall‬‭is‬‭to‬‭remove‬
‭programs from the computer.‬

‭Factors to consider when purchasing an application package:‬


‭-‬ ‭Application intended for.‬
‭-‬ ‭Easiness of installation.‬
‭-‬ ‭Mode of processing (single user, multi user, etc).‬
‭-‬ ‭User friendliness.‬
‭-‬ ‭Availability of support personnel.‬
‭-‬ ‭Availability, readability and clarity of documentation.‬
‭-‬ ‭Memory requirements.‬
‭-‬ ‭Hardware requirements.‬

‭ YPES OF SYSTEMS‬
T
‭1.‬ ‭Real‬ ‭Time‬ ‭Processing‬ ‭System:‬ ‭-‬ ‭An‬ ‭o nline‬ ‭system‬ ‭in‬ ‭which‬ ‭individual,‬ ‭discrete‬
‭transactions‬ ‭are‬ ‭processed‬ ‭as‬ ‭they‬ ‭o ccur‬ ‭to‬ ‭influence‬ ‭the‬ ‭activity‬ ‭currently‬ ‭taking‬
‭place,‬‭as‬‭in‬‭airline‬‭reservation.‬‭Results‬‭o f‬‭the‬‭process‬‭are‬‭produced‬‭immediately.‬‭The‬
‭system‬ ‭response‬ ‭quickly‬ ‭and‬ ‭give‬ ‭feedback‬ ‭o f‬ ‭a‬ ‭request.‬ ‭Thus‬ ‭the‬ ‭system‬ ‭is‬
‭interactive‬ ‭in‬ ‭nature.‬ ‭Such‬ ‭systems‬ ‭include‬ ‭airline‬ ‭reservation‬ ‭systems,‬ ‭hotel‬
‭reservations, stock control, etc.‬

‭ eal‬‭Time‬‭Processing‬‭System‬ ‭c an‬‭also‬‭be‬‭c alled‬‭Transaction‬‭Processing‬‭System‬


R
‭(or‬ ‭Real‬ ‭Time‬ ‭Transaction‬ ‭Processing‬ ‭Systems):‬ ‭this‬ ‭is‬ ‭a‬ ‭real-time‬ ‭(or‬
‭pseudo-real-time)‬ ‭transaction‬ ‭processing‬ ‭system‬ ‭whereby‬ ‭o nly‬ ‭individual‬ ‭items‬ ‭o f‬
‭data‬ ‭need‬ ‭immediate‬ ‭processing,‬ ‭results‬ ‭and‬ ‭files‬ ‭are‬ ‭updated‬ ‭instantly‬ ‭e.g.,‬ ‭airline‬
‭reservation,‬ ‭balance‬ ‭enquiry‬ ‭at‬ ‭an‬ ‭ATM,‬ ‭etc.‬ ‭Response‬ ‭to‬ ‭a‬‭query‬‭needs‬‭to‬‭be‬‭very‬
‭fast‬ ‭and‬ ‭o nce‬ ‭a‬ ‭seat‬ ‭is‬ ‭booked‬‭it‬‭needs‬‭to‬‭marked‬‭as‬‭“not‬‭available”‬‭immediately‬‭to‬
‭avoid any risk of double booking.‬
‭Using‬ ‭this‬ ‭example‬ ‭o f‬ ‭booking‬ ‭seats‬ ‭o n‬ ‭a‬ ‭flight,‬ ‭the‬ ‭following‬ ‭sequence‬ ‭o f‬ ‭events‬
‭would take place:‬
‭-‬ ‭customer/travel agent contacts the airline‬
‭-‬ ‭the‬ ‭customer/travel‬ ‭agents‬ ‭types‬ ‭in‬ ‭the‬ ‭day/time‬ ‭o f‬ ‭flight‬ ‭and‬ ‭number‬ ‭o f‬
‭travellers‬
‭-‬ ‭the‬ ‭customer/travel‬ ‭agent‬‭types‬‭in‬‭the‬‭departure‬‭airport‬‭and‬‭the‬‭destination‬
‭airport‬
‭-‬ ‭the airline database is searched and availability of seats checked‬
‭-‬ ‭if seats are available on the required day/time then a booking is made‬
‭-‬ ‭the‬ ‭database/file‬ ‭is‬ ‭updated‬ ‭immediately‬ ‭to‬ ‭indicate‬ ‭that‬ ‭these‬ ‭seats‬ ‭are‬ ‭no‬
‭longer available and prevents double booking from occurring‬
‭-‬ ‭if no seats are available a message is sent back to the customer/travel agent‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭90‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ t‭ his‬‭uses‬‭real‬‭time‬‭(transaction)‬‭processing‬‭since‬‭the‬‭files‬‭are‬‭updated‬‭in‬‭real‬
‭time; interrogation of files will have access to totally updated information‬

‭Transaction processing’s requirements include:‬


‭-‬ ‭A large quantity of hardware support.‬
‭-‬ ‭Large and fast main storage, over 1 GB.‬
‭-‬ ‭Large and fast backing storage like hard drives of about 300 GB.‬
‭-‬ ‭Efficient‬ ‭communication‬ ‭equipment‬ ‭like‬ ‭fibre‬ ‭o ptics,‬ ‭satellites,‬ ‭etc.‬ ‭Efficient,‬
‭secure and reliable operating systems.‬
‭-‬ ‭However‬‭, transaction processing systems are very expensive‬‭to run.‬

‭ . Real time process control‬


2
‭This‬‭is‬‭a‬‭real-time‬‭system‬‭which‬‭uses‬‭sensors‬‭and‬‭feedback‬‭loops‬‭(i.e.‬‭the‬‭o utput‬‭can‬
‭influence‬‭the‬‭next‬‭input‬‭to‬‭the‬‭system.).‬‭Used‬‭in‬‭safety‬‭c ritical‬‭situations‬‭like‬‭patient‬
‭monitoring,‬ ‭monitoring‬ ‭and‬‭control‬‭in‬‭nuclear‬‭power‬‭stations,‬‭etc.‬‭It‬‭uses‬‭actuators,‬
‭sensors,‬‭DAC,‬‭ADC‬‭to‬‭continuously‬‭and‬‭automatically‬‭monitor‬‭physical‬‭quantities‬‭like‬
‭temperature‬‭in‬‭a‬‭system.‬ ‭It‬‭differs‬‭with‬‭real‬‭time‬‭(transaction)‬‭processing‬‭system‬‭in‬
‭that:‬‭In‬‭real‬‭time‬‭(transaction)‬‭processing‬‭system,‬‭files‬‭are‬‭o ften‬‭updated‬‭in‬‭real‬‭time‬
‭(e.g.‬ ‭when‬ ‭booking‬‭flights‬‭o n‬‭an‬‭airplane);‬‭but‬‭in‬‭real‬‭time‬‭process‬‭control,‬‭physical‬
‭quantities‬ ‭(such‬ ‭as‬ ‭temperature)‬ ‭are‬ ‭continuously‬ ‭monitored‬ ‭and‬ ‭the‬ ‭input‬ ‭is‬
‭processed sufficiently quickly to be capable of influencing the data source‬

‭ .‬‭On-Line‬‭System:‬‭A‬‭system‬‭that‬‭is‬‭directly‬‭linked‬‭to‬‭the‬‭host‬‭computer‬‭for‬‭real-time‬
3
‭communication‬ ‭and‬ ‭provides‬ ‭interaction‬ ‭between‬ ‭the‬ ‭user‬ ‭and‬ ‭the‬ ‭job,‬ ‭as‬ ‭in‬ ‭POS‬
‭terminals‬ ‭in‬ ‭supermarkets.‬ ‭In‬ ‭networked‬ ‭computers,‬ ‭the‬‭terminals‬‭must‬‭be‬‭directly‬
‭linked‬ ‭to‬ ‭the‬ ‭host‬ ‭computer.‬ ‭Examples‬ ‭include‬ ‭ATM‬ ‭systems‬ ‭in‬ ‭banks,‬ ‭airline‬
‭reservation‬ ‭systems.‬ ‭Online‬ ‭systems‬ ‭can‬ ‭just‬ ‭be‬ ‭for‬ ‭information‬ ‭retrieval.‬
‭Information‬ ‭retrieval‬ ‭systems‬ ‭are‬ ‭there‬ ‭for‬ ‭users‬ ‭to‬ ‭access‬ ‭certain‬ ‭information‬
‭promptly‬ ‭as‬ ‭o n‬‭the‬‭internet.‬‭In‬‭contrast,‬‭offline‬‭systems‬‭are‬‭computer‬‭systems‬‭that‬
‭work without being directly connected to the host computer.‬

‭ .‬‭Network‬‭Systems:‬‭-‬‭A‬‭system‬‭in‬‭which‬‭processing‬‭is‬‭carried‬‭o ut‬‭independently‬‭in‬
4
‭more‬ ‭than‬ ‭o ne‬ ‭location‬ ‭but‬ ‭with‬ ‭shared‬ ‭and‬ ‭controlled‬ ‭access‬ ‭to‬ ‭some‬ ‭common‬
‭facilities like file storage.‬

‭ .‬‭Control‬‭System:‬‭-‬‭A‬‭system‬‭in‬‭which‬‭o ne‬‭o r‬‭more‬‭computers‬‭are‬‭used‬‭to‬‭monitor‬


5
‭the‬ ‭o perations‬ ‭o f‬ ‭some‬ ‭non-computer‬ ‭equipment‬ ‭like‬ ‭in‬ ‭o il‬ ‭refineries.‬ ‭Control‬
‭systems‬‭involve‬‭monitoring‬‭and‬‭logging‬‭o f‬‭physical‬‭quantities,‬‭provide‬‭an‬‭analysis‬‭o f‬
‭performance‬ ‭and‬ ‭allows‬ ‭some‬ ‭user‬‭interaction.‬‭Feedback‬‭is‬‭an‬‭essential‬‭element‬‭as‬
‭well‬ ‭as‬ ‭timing.‬‭Most‬‭control‬‭systems‬‭are‬‭real-time‬‭systems,‬‭e.g.‬‭o il‬‭refining,‬‭chemical‬
‭processing, traffic control, etc.‬

‭ .‬ ‭Automated‬ ‭Systems:‬ ‭-‬ ‭These‬ ‭are‬ ‭control‬ ‭systems‬ ‭that‬ ‭are‬ ‭dedicated‬ ‭to‬ ‭o ne‬
6
‭particular‬ ‭task‬ ‭and‬ ‭lack‬ ‭the‬ ‭ability‬ ‭to‬ ‭collect‬ ‭and‬‭analyse‬‭data‬‭as‬‭in‬‭digital‬‭cameras.‬
‭They‬ ‭do‬ ‭not‬ ‭allow‬ ‭for‬ ‭o r‬ ‭act‬ ‭o n‬ ‭user‬ ‭interaction,‬ ‭e.g.‬ ‭washing‬ ‭machines,‬ ‭cameras,‬
‭watches. Most control systems have embedded computers systems inside them.‬

‭ .‬ ‭Multimedia‬ ‭Systems:‬‭-‬‭Are‬‭computer‬‭systems‬‭that‬‭enable‬‭representation‬‭o f‬‭data‬


7
‭in‬‭a‬‭number‬‭o f‬‭formats‬‭like‬‭sound,‬‭pictures,‬‭films,‬‭video,‬‭etc.‬‭Multimedia‬‭systems‬‭are‬
‭used‬ ‭in‬ ‭commercial‬ ‭applications‬ ‭(advertising,‬ ‭journalism,‬ ‭presentations,‬ ‭etc.),‬
‭entertainment‬ ‭(special‬ ‭effects,‬ ‭video‬ ‭games,‬ ‭fine‬ ‭arts,‬ ‭etc.),‬‭education‬‭(CBT‬‭training,‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭91‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ses‬ ‭in‬ ‭virtual‬ ‭reality‬ ‭training,‬ ‭etc.).‬ ‭A‬ ‭computer‬ ‭that‬ ‭can‬ ‭be‬ ‭referred‬ ‭to‬ ‭be‬ ‭a‬
u
‭multimedia system should have at least the following:‬
‭-‬ ‭a CD – ROM/DVD-ROM drive,‬
‭-‬ ‭speakers, large RAM size,‬
‭-‬ ‭large disk storage space,‬
‭-‬ ‭sound card‬
‭-‬ ‭video card and‬
‭-‬ ‭multimedia software like Windows Media Player and‬
‭-‬ ‭o ther software like sound drivers.‬

‭ .‬ ‭Distributed‬ ‭(decentralised)‬ ‭Systems:‬ ‭A‬ ‭system‬ ‭whereby‬ ‭processing‬ ‭is‬ ‭done‬


8
‭independently‬‭in‬‭more‬‭than‬‭o ne‬‭location‬‭but‬‭with‬‭shared‬ ‭and‬‭controlled‬‭accessed‬‭to‬
‭common‬ ‭facilities,‬ ‭like‬ ‭file‬ ‭storage‬ ‭as‬ ‭applied‬‭in‬‭departmental‬‭shops.‬‭These‬‭systems‬
‭are‬ ‭normally‬ ‭found‬ ‭in‬ ‭departmental‬ ‭shops,‬ ‭bank‬ ‭branches‬ ‭that‬ ‭will‬ ‭be‬ ‭linked‬
‭together, etc.‬‭Advantages of distributed systems:‬
‭-‬ ‭Users feel more involved and responsible and this increase motivation.‬
‭-‬ ‭Systems‬ ‭o ften‬ ‭meet‬ ‭user‬ ‭specific‬ ‭needs‬ ‭and‬ ‭requests‬ ‭for‬ ‭changes‬ ‭are‬ ‭more‬
‭readily met.‬
‭-‬ ‭Costs of physical and electronic movement of data are reduced.‬
‭-‬ ‭The total breakdown of information processing disappears.‬
‭Disadvantages of distributed systems:‬
‭-‬ ‭There is often lack of coordination and control.‬
‭-‬ ‭It‬ ‭is‬ ‭difficult‬ ‭to‬ ‭impose‬ ‭standardisation,‬ ‭adequate‬ ‭security‬ ‭measures‬ ‭and‬
‭sharing of data and know-how.‬
‭-‬ ‭Difficult‬ ‭to‬‭o btain‬‭integrated‬‭information‬‭for‬‭top‬‭management.‬‭Duplication‬‭o f‬
‭data is rampant.‬
‭-‬ ‭Excessive investment in hardware, software and personnel is involved.‬

‭ .‬ ‭Centralised‬ ‭systems:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭processing‬ ‭is‬ ‭carried‬ ‭o ut‬ ‭at‬ ‭o ne‬ ‭central‬
9
‭location‬‭for‬‭an‬‭o rganisation‬‭with‬‭a‬‭number‬‭o f‬‭branches.‬‭Users‬‭in‬‭o ther‬‭locations‬‭can‬
‭view‬ ‭data‬ ‭and‬ ‭utilise‬ ‭it‬ ‭but‬ ‭with‬‭limited‬‭capabilities.‬ ‭Centralised‬‭processing‬‭has‬‭the‬
‭following advantages:‬
‭-‬ ‭Hardware within the organisation will be compatible and can be linked.‬
‭-‬ ‭The‬ ‭o rganisation‬ ‭gets‬ ‭better‬ ‭deals‬ ‭in‬ ‭terms‬ ‭o f‬ ‭maintenance‬ ‭contracts.‬
‭Employees‬ ‭do‬ ‭not‬ ‭have‬ ‭to‬ ‭learn‬ ‭new‬ ‭systems‬ ‭when‬ ‭they‬ ‭move‬ ‭from‬ ‭o ne‬
‭department (or branch) to another.‬
‭-‬ ‭It‬ ‭is‬ ‭easier‬ ‭to‬ ‭coordinate‬ ‭staff‬ ‭training‬ ‭courses‬ ‭using‬ ‭the‬‭same‬‭software‬‭and‬
‭hardware for all departments (or branches).‬
‭-‬ ‭There is better control over use of unlicensed software.‬
‭-‬ ‭Data can be exchanged easily between similar types of hardware and software‬

‭Disadvantages of Centralisation:‬
‭-‬ ‭Requires‬ ‭high‬‭initial‬‭capital‬‭investment‬‭o f‬‭sophisticated‬‭equipment,‬‭o perating‬
‭systems,‬ ‭well‬ ‭developed‬ ‭communication‬ ‭systems‬ ‭and‬ ‭complex‬ ‭application‬
‭packages.‬
‭-‬ ‭Requires highly qualified and experienced personnel to run it.‬
‭-‬ ‭A‬ ‭system‬ ‭failure‬ ‭will‬ ‭paralyse‬ ‭the‬ ‭entire‬ ‭system‬ ‭unless‬ ‭expensive‬ ‭backup‬
‭system is provided.‬
‭-‬ ‭Users feel not being fully involved and therefore are not motivated.‬

‭The choice of processing depends on:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭92‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ ‭Cost‬ ‭of‬ ‭hardware:‬ ‭o nline‬ ‭systems‬ ‭are‬ ‭more‬ ‭expensive‬ ‭to‬ ‭install,‬ ‭including‬
‭installation of communication systems like telephones and satellites.‬
‭-‬‭Volume‬‭of‬‭data‬‭involved‬‭:‬‭batch‬‭processing‬‭is‬‭appropriate‬‭where‬‭very‬‭large‬‭data‬‭is‬
‭handled.‬
‭-‬‭Frequency‬‭of‬‭data‬‭c hange:‬‭banks‬‭need‬‭o nline‬‭systems‬‭for‬‭customer‬‭data‬‭changes‬
‭more frequently than in payroll processing systems.‬

‭FILE HANDLING‬
‭ ypes of files‬
T
‭1.‬‭Master‬‭File:‬‭It‬‭is‬‭a‬‭permanent‬‭file‬‭that‬‭is‬‭kept‬‭up-to-date‬‭by‬‭applying‬‭transactions‬
‭that‬ ‭o ccur‬ ‭during‬ ‭business‬ ‭o perations.‬ ‭It‬ ‭contains‬ ‭permanent‬ ‭(static)‬ ‭and‬
‭semi-permanent‬ ‭data.‬‭Static‬‭data‬‭stored‬‭in‬‭database‬‭files‬‭can‬‭include‬‭Surname,‬‭First‬
‭names, Date of birth, etc.‬
‭2.‬ ‭Transaction‬ ‭Files:‬ ‭These‬ ‭are‬ ‭temporary‬ ‭files‬ ‭that‬ ‭contain‬ ‭data‬ ‭that‬ ‭can‬ ‭change‬
‭regularly,‬ ‭e.g.‬ ‭o n‬ ‭daily‬ ‭bases‬ ‭and‬ ‭it‬ ‭is‬ ‭used‬ ‭to‬ ‭update‬ ‭the‬ ‭master‬ ‭file.‬ ‭This‬ ‭includes‬
‭sales‬‭per‬‭day,‬‭student‬‭mark‬‭in‬‭a‬‭weekly‬‭test,‬‭etc.‬‭Transaction‬‭files‬‭are‬‭used‬‭to‬‭update‬
‭master files.‬
‭3.‬‭Reference‬‭files:‬‭These‬‭are‬‭files‬‭that‬‭contain‬‭permanent‬‭data‬‭which‬‭is‬‭required‬‭for‬
‭referencing‬ ‭(viewing)‬ ‭purposes‬ ‭o nly.‬‭This‬‭includes‬‭data‬‭o n‬‭tax‬‭bands,‬‭formulae,‬‭etc.‬
‭No changes to files are done.‬
‭4. Data file:‬‭A set of related records (either written‬‭o r electronic) kept together.‬

‭ . Fixed Length Records‬


A
‭These‬‭are‬‭records‬‭that‬‭allocate‬‭a‬‭specific‬‭amount‬‭o f‬‭space‬‭for‬‭data,‬‭mostly‬‭a‬‭specific‬
‭number‬‭o f‬‭characters.‬‭For‬‭instance,‬‭a‬‭school‬‭keeps‬‭student‬‭records‬‭in‬‭a‬‭fixed‬‭length‬
‭record.‬ ‭The‬ ‭student‬ ‭number‬ ‭has‬ ‭6‬ ‭characters,‬ ‭Surname‬ ‭was‬ ‭assigned‬ ‭10‬
‭characters,‬ ‭First‬ ‭Name‬ ‭is‬ ‭given‬ ‭10‬ ‭characters,‬ ‭Date‬ ‭of‬ ‭Birth‬ ‭has‬ ‭6‬ ‭characters,‬ ‭sex‬
‭has‬ ‭one‬ ‭character‬ ‭and‬ ‭c lass‬ ‭has‬ ‭2‬ ‭characters‬ ‭o nly‬ ‭in‬ ‭that‬ ‭o rder‬ ‭in‬ ‭the‬ ‭computer‬
‭database file. In total, the length of each record is 35 characters.‬
‭The following student details are to be entered into the computer:‬
‭Student Number‬‭:‬‭012999,‬‭Surname‬‭:‬‭Kapondeni,‬‭First‬‭Name‬‭:‬‭Tungamirirai‬
‭Date of Birth‬‭:‬‭7‬‭th‬ ‭of February 1978,‬‭Sex:‬‭Male,‬‭Class‬‭:‬‭Form 4A‬

‭When entered into the database, the record will appear as follows:‬

‭ rom the table above, it can be noticed that:‬


F
‭-‬ ‭The‬‭Sex‬‭field‬‭is‬‭coded‬‭to‬‭accommodate‬‭o nly‬‭the‬‭letters‬‭M‬‭o r‬‭F‬‭.‬‭This‬‭is‬‭shorter‬‭and‬
‭therefore‬‭faster‬‭to‬‭enter‬‭data‬‭into‬‭the‬‭computer‬‭and‬‭to‬‭search‬‭records‬‭than‬‭entering‬
‭the words Male or Female.‬
‭-‬ ‭The‬ ‭Surname‬ ‭Kapondeni‬‭is‬‭shorter‬‭than‬‭the‬‭allocated‬‭10‬‭spaces.‬‭The‬‭o ther‬‭spaces‬
‭will remain idle (unoccupied).‬
‭-‬ ‭The‬ ‭First‬ ‭Name‬ ‭Tungamirirai‬ ‭is‬ ‭too‬ ‭long‬ ‭than‬ ‭the‬ ‭allocated‬ ‭spaces‬ ‭and‬ ‭therefore‬
‭extra characters will be cut.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭93‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Fixed length records have the following advantages:‬


‭●‬ ‭Entering data is faster as records are shorter and less typing is required.‬
‭●‬ ‭Easy to search data‬
‭●‬ ‭Less data entry errors are encountered.‬
‭●‬ ‭It is faster to carry out searches.‬
‭●‬ ‭Faster to do validation checks and procedures.‬
‭●‬ ‭They are easier for programmers to work with than variable length records.‬
‭●‬ ‭They‬ ‭allow‬ ‭an‬ ‭accurate‬ ‭estimate‬ ‭o f‬ ‭disk‬ ‭storage‬ ‭requirements.‬ ‭Thus‬ ‭disk‬
‭storage‬ ‭space‬‭can‬‭be‬‭easily‬‭managed‬‭as‬‭records‬‭o ccupy‬‭a‬‭specific‬‭number‬‭o f‬
‭characters.‬
‭●‬ ‭They are very easy to update‬

‭However, fixed length records have the following disadvantages:‬


‭●‬ ‭Can‬‭lead‬‭to‬‭wastage‬‭if‬‭disk‬‭storage‬‭space‬‭if‬‭used‬‭to‬‭store‬‭variable‬‭length‬‭data.‬
‭For example, not all surnames are of the same length.‬
‭●‬ ‭Some‬ ‭spaces‬ ‭may‬ ‭lie‬ ‭idle‬ ‭as‬ ‭data‬ ‭entered‬ ‭will‬ ‭be‬ ‭shorter‬ ‭than‬ ‭the‬ ‭space‬
‭allocated.‬
‭●‬ ‭Some‬ ‭data‬ ‭to‬ ‭be‬ ‭entered‬ ‭may‬ ‭be‬ ‭too‬ ‭long‬ ‭for‬ ‭the‬ ‭space‬ ‭allocated‬ ‭and‬
‭therefore will be cut.‬
‭●‬ ‭Not flexible to work with‬

‭ . Variable Length Records‬


B
‭These‬‭are‬‭records‬‭that‬‭allow‬‭data‬‭to‬‭o ccupy‬‭the‬‭amount‬‭o f‬‭space‬‭that‬‭it‬‭needs.‬‭They‬
‭allow‬ ‭data‬ ‭with‬ ‭varying‬ ‭(different)‬ ‭number‬ ‭o f‬ ‭characters‬ ‭o r‬ ‭sizes.‬ ‭The‬ ‭number‬ ‭o f‬
‭fields‬‭may‬‭also‬‭vary.‬‭They‬‭usually‬‭show‬‭where‬‭the‬‭field‬‭o r‬‭record‬‭starts‬‭and‬‭ends,‬‭for‬
‭example:‬

‭ B‬‭:-‬‭*‬‭Indicates the end of field marker, and the‬‭≈‬‭indicates the end of record marker‬
N
‭Variable length records have the following advantages:‬
‭●‬ ‭They‬‭are‬‭more‬‭economical‬‭in‬‭terms‬‭o f‬‭usage‬‭o f‬‭disk‬‭storage‬‭space‬‭as‬‭they‬‭do‬
‭not allow spaces to lie idle.‬
‭●‬ ‭Data entered will not be cut but appears as entered no matter how long it is.‬
‭●‬ ‭may reduce time taken to read file/transfer data‬
‭●‬ ‭enables as many fields as possible to be added to a file‬

‭However, variable length records have the following disadvantages:‬


‭●‬ ‭End‬‭o f‬‭field‬‭and‬‭end‬‭o f‬‭record‬‭markers‬‭o ccupy‬‭disk‬‭storage‬‭space‬‭that‬‭might‬
‭be used to store data.‬
‭●‬ ‭Difficult‬ ‭to‬ ‭update‬ ‭(add‬ ‭o r‬ ‭delete)‬ ‭as‬ ‭the‬ ‭transaction‬ ‭and‬ ‭master‬ ‭files‬ ‭might‬
‭have different lengths.‬
‭●‬ ‭more complex to use‬
‭●‬ ‭more complex to manage‬
‭●‬ ‭Hard to search data in the files‬

‭ ile Organisation‬
F
‭Refers‬ ‭to‬ ‭the‬ ‭way‬ ‭in‬ ‭which‬ ‭records‬ ‭in‬‭a‬‭file‬‭are‬‭stored,‬‭retrieved‬‭and‬‭updated.‬‭This‬
‭affects‬ ‭the‬ ‭number‬ ‭o f‬ ‭records‬ ‭stored,‬ ‭access‬ ‭speed‬ ‭and‬ ‭updating‬ ‭speed.‬ ‭The‬ ‭most‬
‭common‬‭methods‬‭o f‬‭file‬‭o rganisation‬‭are:‬‭Serial‬‭File‬‭Organisation,‬‭Sequential‬‭File‬
‭organisation,‬ ‭indexed‬ ‭–‬ ‭sequential‬ ‭file‬ ‭organisation‬ ‭and‬ ‭random‬ ‭(direct‬‭)‬ ‭file‬
‭o rganisation.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭94‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ .‬ ‭Serial‬ ‭File‬ ‭Organisation:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭data‬‭is‬‭recorded‬‭o ne‬‭after‬‭another‬‭as‬


1
‭they‬‭o ccur,‬‭without‬‭any‬‭definite‬‭o rder,‬‭as‬‭supported‬‭by‬‭magnetic‬‭tapes.‬‭Data‬‭is‬‭stored‬
‭according‬ ‭to‬ ‭arrival‬‭time.‬‭Data‬‭is‬‭read‬‭from‬‭the‬‭first‬‭record‬‭until‬‭the‬‭needed‬‭data‬‭is‬
‭found.‬ ‭New‬ ‭records‬ ‭are‬ ‭added‬ ‭to‬ ‭the‬ ‭end‬ ‭o f‬ ‭the‬ ‭file.‬ ‭Serial‬ ‭file‬ ‭o rganisation‬ ‭is‬ ‭not‬
‭appropriate‬ ‭for‬ ‭master‬ ‭files‬‭since‬‭records‬‭are‬‭not‬‭sorted‬‭and‬‭therefore‬‭are‬‭difficult‬
‭to‬ ‭access‬ ‭and‬ ‭to‬ ‭update.‬ ‭It‬ ‭is‬ ‭faster‬ ‭to‬ ‭find‬ ‭records‬ ‭at‬ ‭the‬ ‭beginning‬‭o f‬‭the‬‭file,‬‭but‬
‭takes‬‭too‬‭long‬‭to‬‭find‬‭records‬‭towards‬‭the‬‭end‬‭o f‬‭the‬‭file.‬‭Serial‬‭files‬‭are‬‭suitable‬‭for‬
‭temporary transaction files since records are not sorted.‬
‭Serial‬‭files‬‭promote‬‭Serial‬‭Access:‬‭whereby‬‭records‬‭are‬‭accessed‬‭by‬‭reading‬‭from‬‭the‬
‭first until needed record is found in an unordered file, e.g on magnetic tape.‬

‭ .‬ ‭Sequential‬ ‭File‬ ‭Organisation:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭records‬ ‭are‬ ‭sorted‬ ‭into‬ ‭a‬ ‭key‬
2
‭sequence,‬ ‭that‬ ‭is,‬ ‭in‬ ‭ascending‬ ‭o r‬ ‭descending‬ ‭o rder‬ ‭o f‬ ‭a‬ ‭given‬ ‭key‬ ‭filed‬ ‭as‬ ‭o n‬
‭magnetic‬ ‭tapes.‬ ‭Sequential‬ ‭files‬ ‭o rganisation‬ ‭is‬ ‭appropriate‬ ‭for‬ ‭files‬ ‭with‬ ‭a‬‭high‬‭hit‬
‭rate‬‭like‬‭payroll‬‭processing.‬‭They‬‭are‬‭suitable‬‭for‬‭master‬‭files‬‭since‬‭they‬‭are‬‭o rdered.‬
‭However,‬ ‭it‬ ‭takes‬ ‭too‬ ‭long‬ ‭to‬ ‭access‬ ‭records‬ ‭towards‬ ‭the‬ ‭end‬ ‭o f‬ ‭the‬ ‭file‬ ‭since‬ ‭the‬
‭records‬ ‭are‬ ‭accessed‬ ‭by‬ ‭reading‬ ‭from‬ ‭the‬ ‭first‬ ‭record‬ ‭until‬ ‭the‬ ‭required‬ ‭data‬ ‭is‬
‭found.‬‭However,‬‭searching‬‭o f‬‭records‬‭at‬‭the‬‭beginning‬‭o f‬‭files‬‭is‬‭very‬‭fast.‬‭Adding‬‭o f‬
‭new‬‭records‬‭is‬‭difficult‬‭as‬‭this‬‭is‬‭done‬‭by‬‭re-entering‬‭the‬‭data‬‭and‬‭the‬‭new‬‭record‬‭is‬
‭inserted‬‭at‬‭its‬‭right‬‭position.‬‭It‬‭is‬‭time‬‭consuming‬‭to‬‭update‬‭such‬‭records.‬‭Suitable‬‭for‬
‭master‬‭files‬‭since‬‭records‬‭are‬‭sorted.‬‭This‬‭is‬‭used‬‭where‬‭all‬‭records‬‭need‬‭processing,‬
‭e.g payroll.‬
‭Sequential‬ ‭Files‬ ‭promote‬ ‭sequential‬ ‭Access:‬ ‭Sequential‬ ‭Access‬ ‭is‬‭whereby‬‭records‬
‭are‬‭retrieved‬‭by‬‭reading‬‭from‬‭the‬‭first‬‭record‬‭until‬‭the‬‭needed‬‭record‬‭is‬‭found‬‭in‬‭an‬
‭o rdered‬ ‭list‬ ‭o f‬ ‭records,‬ ‭e.g.‬ ‭o n‬ ‭magnetic‬ ‭tape.‬ ‭Sequential‬ ‭access‬ ‭o ccurs‬ ‭where‬
‭records are ordered using a key field.‬

‭ .‬ ‭Indexed-Sequential‬ ‭Files:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭records‬ ‭are‬ ‭o rdered‬ ‭in‬ ‭sequence‬
3
‭based‬ ‭o n‬ ‭the‬ ‭value‬‭o f‬‭the‬‭index‬‭o r‬‭disk‬‭address‬‭as‬‭supported‬‭by‬‭hard‬‭disks.‬‭This‬‭is‬
‭used‬‭for‬‭storing‬‭master‬‭files‬‭records‬‭since‬‭the‬‭records‬‭are‬‭o rdered.‬‭It‬‭is‬‭also‬‭suitable‬
‭for‬ ‭real‬ ‭time‬ ‭processing‬ ‭applications‬ ‭like‬ ‭stock‬ ‭control‬ ‭as‬ ‭it‬ ‭is‬ ‭fast‬ ‭in‬ ‭accessing‬
‭records‬ ‭and‬ ‭in‬ ‭updating‬ ‭them.‬ ‭It‬ ‭provides‬ ‭direct‬ ‭access‬ ‭to‬ ‭data‬ ‭as‬ ‭o n‬ ‭hard‬ ‭disks,‬
‭diskettes and compact disks.‬

‭ .‬‭Random‬‭(Direct/hash/relative)‬‭File‬‭Organisation:‬‭This‬‭is‬‭whereby‬‭records‬‭are‬
4
‭stored‬‭in‬‭no‬‭o rder‬‭but‬‭accessed‬‭according‬‭to‬‭their‬‭disk‬‭address‬‭o r‬‭relative‬‭position,‬
‭as‬ ‭supported‬ ‭by‬ ‭hard‬ ‭disks‬ ‭and‬ ‭compact‬ ‭disks.‬ ‭The‬ ‭address‬ ‭o f‬ ‭the‬ ‭record‬ ‭is‬
‭calculated‬‭using‬‭the‬‭hashing‬‭algorithm.‬‭It‬‭is‬‭appropriate‬‭where‬‭extremely‬‭fast‬‭access‬
‭to‬‭data‬‭is‬‭required‬‭as‬‭in‬‭airline‬‭reservation.‬‭Updating‬‭o f‬‭records‬‭is‬‭in‬‭situ,‬‭very‬‭simple‬
‭and‬ ‭very‬ ‭fast.‬ ‭Hard‬ ‭disk,‬ ‭compact‬ ‭disks‬ ‭and‬ ‭diskettes‬ ‭promotes‬ ‭random‬ ‭file‬
‭o rganisation.‬
‭Random‬ ‭File‬ ‭o rganisation‬ ‭promotes‬ ‭Random/Direct‬ ‭Access‬ ‭to‬ ‭records:‬ ‭Direct‬
‭access‬ ‭is‬ ‭hereby‬ ‭records‬ ‭are‬ ‭retrieved‬ ‭randomly‬ ‭by‬ ‭going‬ ‭straight‬ ‭to‬ ‭the‬ ‭needed‬
‭record‬‭by‬‭using‬‭address‬‭o f‬‭data,‬‭as‬‭supported‬‭by‬‭hard‬‭disks,‬‭compact‬‭disks,‬‭memory‬
‭sticks, etc.‬

‭ ile Processing‬
F
‭Refers‬ ‭to‬ ‭any‬ ‭form‬ ‭o f‬ ‭activity‬ ‭that‬ ‭can‬ ‭be‬ ‭done‬ ‭using‬ ‭files.‬ ‭This‬ ‭includes:‬ ‭file‬
‭referencing, sorting, maintenance and updating.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭95‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ .‬‭File‬‭Referencing/Interrogation:‬‭This‬‭involves‬‭searching‬‭o f‬‭record‬‭and‬‭displaying‬
1
‭it‬ ‭o n‬ ‭the‬ ‭screen‬ ‭in‬ ‭o rder‬ ‭to‬ ‭gain‬ ‭certain‬ ‭information,‬ ‭leaving‬ ‭it‬ ‭unchanged.‬ ‭The‬
‭record can also be printed.‬
‭2.‬ ‭Sorting:‬ ‭Refers‬ ‭to‬ ‭a‬ ‭process‬ ‭o f‬ ‭arranging‬ ‭(organising)‬ ‭records‬ ‭in‬ ‭a‬ ‭specific‬
‭o rdered sequence, like in ascending or descending order of the key field.‬
‭3.‬ ‭Merging‬ ‭Files‬ ‭:‬ ‭This‬ ‭is‬ ‭the‬ ‭process‬ ‭o f‬ ‭combining‬ ‭two‬ ‭o r‬ ‭more‬‭records‬‭into‬‭o ne.‬
‭Below is an example of how records can be merged:‬
‭Record A (sorted)‬ ‭Record B (unsorted)‬
‭12‬ ‭34‬ ‭71‬ ‭78‬ ‭101‬ ‭103‬ ‭67‬ ‭3‬ ‭90‬ ‭12‬
‭Record C (Merged and sorted for records A and Record B)‬
‭3‬ ‭12‬ ‭34‬ ‭67‬ ‭71‬ ‭78‬ ‭90‬ ‭101‬ ‭103‬
‭4.‬ ‭File‬ ‭maintenance:‬ ‭This‬ ‭is‬ ‭the‬ ‭process‬ ‭o f‬ ‭reorganising‬ ‭the‬ ‭structure‬ ‭o f‬ ‭records‬
‭and‬‭changing‬‭(adding‬‭o r‬‭removing‬‭o r‬‭editing)‬‭fields.‬‭This‬‭can‬‭be‬‭due‬‭to‬‭changes‬‭due‬
‭to addition or deletion of records.‬
‭5.‬ ‭File‬ ‭Updating:‬ ‭Updating‬ ‭is‬ ‭the‬ ‭process‬ ‭o f‬ ‭either‬ ‭adding‬ ‭new‬ ‭record,‬ ‭deleting‬
‭unwanted‬ ‭records‬ ‭o r‬ ‭modifying‬ ‭existing‬ ‭records.‬ ‭It‬ ‭involves‬ ‭making‬ ‭necessary‬
‭changes‬ ‭to‬ ‭files‬ ‭and‬ ‭records.‬ ‭Mostly‬ ‭master‬ ‭files‬ ‭are‬ ‭updated‬ ‭and‬ ‭they‬ ‭must‬ ‭be‬
‭up-to-date (contain accurate and most recent information)‬‭.‬
‭For updating to occur, any one of the following must have occurred:‬
‭●‬ ‭A new record has been entered.‬
‭●‬ ‭Deletion of an unwanted record.‬
‭●‬ ‭An‬ ‭amendment‬ ‭(change)‬ ‭to‬ ‭the‬ ‭existing‬ ‭data‬ ‭has‬ ‭been‬ ‭made,‬ ‭e.g.‬ ‭change‬ ‭in‬
‭date of birth only.‬

‭ he‬‭most‬‭common‬‭methods‬‭of‬‭file‬‭updating‬‭are:‬‭Updating‬‭in‬‭situ‬‭and‬‭Updating‬‭by‬
T
‭copying‬‭.‬

‭ . Updating by copying‬
a
‭This‬‭happens‬‭in‬‭sequential‬‭file‬‭updating‬‭process.‬‭This‬‭is‬‭done‬‭through‬‭the‬‭following‬
‭steps:‬
‭-‬ ‭A record is read from master file into memory.‬
‭-‬ ‭A record is read from transaction file into memory.‬
‭-‬ ‭Record keys from each file are compared.‬
‭-‬ ‭If‬ ‭record‬ ‭keys‬‭are‬‭the‬‭same,‬‭the‬‭master‬‭file‬‭is‬‭updated‬‭by‬‭moving‬‭fields‬‭form‬
‭transaction file to the master file.‬

I‭ n‬ ‭sequential‬ ‭file‬ ‭updating,‬ ‭it‬ ‭is‬ ‭recommended‬ ‭to‬ ‭keep‬ ‭at‬ ‭least‬ ‭three‬ ‭master‬ ‭file‬
‭versions‬‭that‬‭will‬‭be‬‭used‬‭for‬‭data‬‭recovery‬‭in‬‭case‬‭o f‬‭a‬‭system‬‭failure‬‭o r‬‭accidental‬
‭loss‬‭o f‬‭data.‬‭The‬‭first‬‭master‬‭file‬‭is‬‭called‬‭the‬‭Grandfather‬‭file,‬‭the‬‭second‬‭master‬‭file‬
‭is‬ ‭called‬ ‭the‬ ‭father‬ ‭file‬ ‭and‬ ‭the‬ ‭third‬ ‭master‬ ‭file‬ ‭is‬ ‭the‬ ‭son‬‭file.‬‭This‬‭relationship‬‭is‬
‭called‬ ‭the‬ ‭grandfather-father-son‬ ‭version‬ ‭o f‬ ‭files.‬ ‭The‬ ‭process‬ ‭of‬ ‭keeping‬ ‭three‬
‭versions‬ ‭of‬ ‭master‬ ‭files‬ ‭( grandfather-father-son)‬ ‭as‬ ‭a‬ ‭result‬ ‭of‬ ‭sequential‬ ‭file‬
‭updating‬‭is‬‭c alled‬‭File‬‭Generations‬‭.‬ ‭Thus‬‭the‬‭first‬‭master‬‭file‬‭(grandfather‬‭file)‬‭is‬
‭called‬‭the‬‭first‬‭generation‬‭file,‬‭the‬‭second‬‭master‬‭file‬‭(father‬‭file)‬‭is‬‭called‬‭the‬‭second‬
‭generation‬ ‭file‬ ‭and‬ ‭the‬ ‭third‬ ‭master‬ ‭file‬ ‭(son‬ ‭file)‬ ‭is‬ ‭the‬ ‭third‬ ‭generation‬ ‭file.‬ ‭The‬
‭following diagram illustrates the sequential file updating process:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭96‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
*‭ NB:‬ ‭-‬ ‭Always‬ ‭create‬ ‭data‬
‭backups‬ ‭o n‬ ‭compact‬ ‭disk‬ ‭o r‬
‭hard‬ ‭disks‬ ‭and‬ ‭re-run‬ ‭the‬ ‭o ld‬
‭master‬ ‭file‬ ‭with‬ ‭the‬ ‭transaction‬
‭file‬ ‭if‬ ‭the‬ ‭computer‬ ‭system‬‭fails‬
‭o r‬ ‭if‬ ‭data‬ ‭is‬ ‭lost.‬ ‭This‬ ‭is‬ ‭a‬ ‭data‬
‭recovery‬ ‭method‬ ‭that‬ ‭works‬
‭well.‬

*‭ ‬‭NB‬‭:-‬ ‭A‬ ‭backup‬ ‭is‬ ‭a‬ ‭copy‬ ‭o f‬


‭file(s)‬‭o n‬‭an‬‭alternative‬‭medium‬
‭like‬ ‭CD-ROM‬ ‭which‬ ‭is‬ ‭kept‬ ‭in‬
‭separate‬ ‭location‬ ‭in‬ ‭case‬ ‭the‬
‭o riginal‬ ‭file‬ ‭is‬ ‭damaged‬ ‭o r‬ ‭lost‬
‭and‬ ‭will‬ ‭be‬ ‭used‬ ‭for‬ ‭recovery‬
‭purposes.‬ ‭The‬ ‭o riginal‬ ‭files‬
‭could‬ ‭be‬ ‭deleted‬ ‭accidentally,‬
‭deleted‬ ‭by‬ ‭hackers,‬ ‭corrupted‬
‭by‬ ‭system‬ ‭failure‬ ‭o r‬ ‭could‬ ‭be‬
‭corrupted by hackers.‬

‭ . Updating by overlay (in situ):‬


b
‭In this case, a record is‬
‭●‬ ‭accessed directly,‬
‭●‬ ‭read into memory,‬
‭●‬ ‭updated and then‬
‭●‬ ‭written back to its original position (in situ).‬
‭This‬ ‭o ccurs‬ ‭in‬ ‭random‬ ‭and‬ ‭indexed-sequential‬ ‭files,‬ ‭thus‬ ‭o n‬‭devices‬‭like‬‭hard‬‭discs‬
‭and memory sticks.‬

‭PROGRAMMING CONCEPTS‬
‭ efinition of terms:‬
D
‭-‬‭Program‬‭:‬‭a‬‭set‬‭o f‬‭detailed‬‭and‬‭unambiguous‬‭instructions‬‭that‬‭instructs‬‭a‬‭computer‬
‭to perform a specific task, for example, to add a set of numbers.‬
‭- Programming‬‭: A process of designing, coding and‬‭testing computer programs‬
‭-‬ ‭Programmer‬‭:‬ ‭A‬‭person‬‭who‬‭specialises‬‭in‬‭designing,‬‭coding‬‭and‬‭testing‬‭computer‬
‭programs‬
‭-‬‭Problem‬‭:‬‭any‬‭question‬‭o r‬‭matter‬‭involving‬‭difficulty‬‭o r‬‭uncertainty‬‭and‬‭is‬‭proposed‬
‭for solution.‬

‭ rogramming Languages‬
P
‭A‬ ‭programming‬ ‭language‬ ‭is‬‭a‬‭set‬‭o f‬‭symbols‬‭in‬‭computer‬‭language‬‭that‬‭are‬‭used‬‭in‬
‭coding‬‭computer‬‭programs.‬‭A‬‭programming‬‭language‬‭is‬‭a‬‭specially‬‭written‬‭code‬‭used‬
‭for writing application programs e.g C, Pascal, COBOL, BASIC, C++ and Java.‬

‭Programming languages are of the following types:‬

‭ .‬ ‭Low‬ ‭Level‬ ‭Languages‬ ‭(LLL):‬ ‭These‬ ‭are‬ ‭programming‬ ‭languages‬ ‭used‬ ‭to‬ ‭write‬
1
‭programs‬‭in‬‭machine‬‭code,‬‭that‬‭is‬‭in‬‭zeros‬‭and‬‭o nes‬‭o r‬‭in‬‭mnemonic‬‭codes.‬‭Low‬‭level‬
‭language is in two forms:‬‭Machine Language‬‭and‬‭Assembly‬‭Language‬‭.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭97‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ .‬‭Machine‬‭Code‬‭(Language)‬‭is‬‭the‬‭language‬‭used‬‭to‬‭write‬‭programs‬‭in‬‭binary‬‭form‬
a
‭(zeros and ones). Machine language has the following‬‭advantages‬‭:‬
‭(i)‬ ‭Programs‬ ‭run‬ ‭faster‬ ‭since‬ ‭they‬ ‭are‬ ‭already‬ ‭in‬ ‭computer‬ ‭language.‬ ‭There‬ ‭is‬ ‭no‬
‭need for conversion as programs are in machine language.‬
‭(ii) Programs occupy very small disc storage space by storing just 1s and 0s.‬

‭Disadvantages of Machine Language:‬


‭●‬ ‭They are very difficult to learn.‬
‭●‬ ‭They are difficult to understand.‬
‭●‬ ‭Very difficult to use and takes too long to find an error in a program.‬
‭●‬ ‭It takes too long to develop working programs.‬
‭●‬ ‭They‬ ‭are‬ ‭machine‬ ‭dependent‬ ‭(they‬ ‭can‬ ‭o nly‬ ‭work‬ ‭o n‬ ‭type‬ ‭o f‬ ‭computer‬
‭designed for and not work on other computers)‬

‭ .‬‭Assembly‬‭Language‬‭:‬‭These‬‭are‬‭programming‬‭languages‬‭that‬‭use‬‭mnemonic‬‭codes‬
b
‭in‬ ‭coding‬ ‭programs.‬ ‭Mnemonic‬ ‭codes‬ ‭are‬ ‭abbreviations‬ ‭used‬ ‭in‬ ‭coding‬ ‭assembly‬
‭language‬ ‭programs,‬ ‭for‬ ‭example,‬ ‭LDA‬ ‭for‬ ‭Load,‬ ‭ADD‬ ‭for‬ ‭Addition,‬ ‭etc.‬ ‭Mnemonic‬
‭codes‬ ‭are‬ ‭very‬ ‭close‬ ‭to‬ ‭machine‬ ‭code,‬ ‭hence‬ ‭are‬ ‭low‬ ‭level‬ ‭language‬ ‭assembly‬
‭language codes‬
‭Advantages of Assembly language:‬
‭●‬ ‭One‬ ‭assembly‬ ‭language‬ ‭instruction‬ ‭corresponds‬ ‭to‬ ‭o ne‬ ‭machine‬ ‭code‬
‭instruction and therefore translation is easier and faster.‬
‭●‬ ‭Programs run faster since they are close to machine code.‬
‭●‬ ‭They occupy very small disk storage space hence are economical to use.‬
‭●‬ ‭Easier for a programmer to use than machine language.‬

‭Disadvantages of Assembly Language‬


‭●‬ ‭They are very difficult to learn.‬
‭●‬ ‭They are very difficult to understand.‬
‭●‬ ‭Takes too long to develop working programs.‬
‭●‬ ‭They can be machine dependent.‬

‭ .‬ ‭High‬ ‭Level‬ ‭Languages‬ ‭(HLL):‬ ‭These‬ ‭are‬ ‭programming‬ ‭languages‬ ‭that‬ ‭use‬
2
‭English-like‬ ‭statements‬ ‭in‬ ‭coding‬ ‭programs,‬ ‭for‬ ‭example‬ ‭COBOL,‬ ‭Pascal,‬ ‭BASIC,‬ ‭etc.‬
‭There‬ ‭are‬ ‭so‬ ‭many‬ ‭high‬ ‭level‬ ‭languages‬ ‭because‬ ‭each‬ ‭language‬ ‭is‬ ‭designed‬ ‭for‬ ‭a‬
‭specific‬‭problem‬‭to‬‭be‬‭solved‬‭in‬‭o ur‬‭daily‬‭lives.‬‭For‬‭example‬‭BASIC‬‭was‬‭designed‬‭for‬
‭learning‬ ‭purposes,‬ ‭COBOL‬ ‭for‬ ‭business‬ ‭applications,‬ ‭FORTRAN‬ ‭for‬ ‭scientific‬
‭purposes,‬ ‭etc.‬ ‭Below‬ ‭is‬ ‭an‬ ‭example‬ ‭o f‬ ‭a‬ ‭BASIC‬ ‭program‬ ‭that‬ ‭accepts‬ ‭two‬ ‭numbers‬
‭entered through the keyboard, adds them and display the result on the screen:‬
‭INPUT “ENTER FIRST NUMBER.”, A‬
‭INPUT “ENTER SECOND NUMBER.”, B‬
‭SUM = A + B‬
‭PRINT SUM‬
‭END‬

‭ rograms‬‭written‬‭in‬‭High‬‭Level‬‭Language‬‭are‬‭first‬‭converted‬‭to‬‭machine‬‭code‬‭before‬
P
‭running.‬

‭Advantages of High Level Languages:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭98‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ T ‭ hey‬ ‭are‬ ‭easier‬ ‭to‬ ‭understand‬ ‭since‬ ‭they‬ ‭are‬ ‭written‬ ‭in‬ ‭English-like‬
‭statements which are more readable.‬
‭●‬ ‭They are easier to learn.‬
‭●‬ ‭It is easier to work with, that is to correct errors and to test programs.‬
‭●‬ ‭They‬ ‭are‬‭problem‬‭o riented‬‭and‬‭therefore‬‭can‬‭be‬‭used‬‭o n‬‭any‬‭computer‬‭(not‬
‭machine dependent)‬

‭Disadvantages of HLL‬
‭●‬ ‭Takes long to run since they need to be first converted to machine code.‬
‭●‬ ‭They occupy a lot of disk storage space as compared to low level languages.‬

‭Factors to consider when choosing a programming language‬


‭●‬ ‭Nature of the application.‬
‭●‬ ‭Availability‬ ‭o f‬ ‭needed‬ ‭facilities‬ ‭in‬ ‭the‬ ‭programming‬ ‭language‬ ‭for‬ ‭system‬
‭implementation.‬
‭●‬ ‭Availability of compatible hardware.‬
‭●‬ ‭Availability of expertise of the programmers.‬

‭ ranslators‬
T
‭These‬‭are‬‭programs‬‭used‬‭to‬‭convert‬‭source‬‭code‬‭into‬‭machine‬‭code,‬‭and‬‭are‬‭in‬‭two‬
‭types,‬ ‭which‬ ‭are‬ ‭interpreters,‬ ‭compilers‬ ‭and‬ ‭assemblers‬‭,‬ ‭which‬ ‭are‬ ‭further‬
‭explained below:‬

‭ . Interpreters‬
1
‭These‬‭are‬‭programs‬‭that‬‭convert‬‭(translate)‬‭and‬‭run‬‭o ne‬‭instruction‬‭o f‬‭a‬‭program‬‭at‬
‭a‬ ‭time‬ ‭before‬ ‭going‬ ‭to‬ ‭the‬ ‭next,‬ ‭until‬ ‭the‬ ‭end‬ ‭o f‬ ‭the‬ ‭program,‬ ‭e.g.‬ ‭the‬ ‭BASIC‬
‭interpreter.‬ ‭They‬ ‭do‬ ‭not‬ ‭produce‬ ‭the‬ ‭machine‬ ‭code‬ ‭version‬ ‭o f‬ ‭a‬ ‭program;‬ ‭hence‬
‭conversion‬ ‭is‬ ‭repeated‬ ‭when‬ ‭you‬ ‭run‬ ‭the‬ ‭program‬ ‭again.‬ ‭Thus‬ ‭interpreters‬ ‭retain‬
‭source‬ ‭code.‬ ‭The‬ ‭interpreter‬ ‭must‬ ‭be‬ ‭present‬ ‭in‬ ‭the‬ ‭computer‬ ‭for‬ ‭the‬ ‭program‬ ‭to‬
‭run.‬
‭Functions of Interpreters‬
‭●‬ ‭They check syntax error in a program statement.‬
‭●‬ ‭They‬‭translate‬‭an‬‭instruction‬‭into‬‭machine‬‭language‬‭and‬‭run‬‭it‬‭before‬‭going‬‭to‬
‭the next.‬
‭●‬ ‭Allocates storage space to variables.‬
‭Advantages of interpreters‬
‭●‬ ‭It is easy to find and correct syntax errors in interpreted programs.‬
‭●‬ ‭It is very fast to run programs for the first time.‬
‭●‬ ‭It is very fast to run small programs.‬
‭Disadvantages of interpreters‬
‭●‬ ‭They are very slow in running very large programs.‬
‭●‬ ‭They‬ ‭do‬ ‭not‬ ‭produce‬ ‭an‬ ‭o bject‬ ‭code‬ ‭o f‬ ‭a‬ ‭source‬ ‭code‬‭and‬‭hence‬‭difficult‬‭to‬
‭use.‬
‭●‬ ‭The interpreter must be present in the computer for the program to run.‬

‭ . Compilers‬
2
‭These‬ ‭are‬ ‭programs‬ ‭that‬ ‭convert‬ ‭a‬ ‭high‬ ‭level‬ ‭language‬ ‭program‬ ‭into‬ ‭its‬ ‭machine‬
‭code‬‭equivalent‬‭at‬‭o ne‬‭go‬‭and‬‭then‬‭run‬‭it,‬‭e.g.‬‭the‬‭COBOL‬‭compiler.‬‭Thus‬‭it‬‭translates‬
‭the‬ ‭entire‬ ‭program‬ ‭before‬ ‭running‬ ‭it.‬‭Once‬‭compiled,‬‭the‬‭program‬‭no‬‭longer‬‭needs‬
‭conversion‬ ‭since‬ ‭the‬ ‭machine‬ ‭code‬ ‭version‬ ‭is‬ ‭the‬ ‭o ne‬ ‭that‬ ‭will‬ ‭be‬ ‭run,‬ ‭until‬ ‭some‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭99‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
c‭ hanges‬‭are‬‭made‬‭to‬‭the‬‭program‬‭code.‬‭Thus‬‭a‬‭compiler‬‭produces‬‭an‬‭o bject‬‭code‬‭o f‬
‭the program. The computer must have a compiler for translation.‬
‭Functions of Compilers‬
‭●‬ ‭They check syntax errors in program statements.‬
‭●‬ ‭They allocate storage space to variables.‬
‭●‬ ‭Translate the whole program into machine code at one go.‬
‭●‬ ‭Run an object code of the program.‬
‭●‬ ‭Produces a program listing which indicates position of errors in a program.‬
‭Advantages of Compilers‬
‭●‬ ‭Compiled programs runs faster since the object code is run.‬
‭●‬ ‭Compilers‬ ‭indicate‬ ‭the‬ ‭line‬ ‭numbers‬ ‭with‬ ‭syntax‬ ‭errors‬ ‭and‬‭therefore‬‭assist‬
‭programmers in debugging programs.‬
‭●‬ ‭They are appropriate even for very large programs.‬
‭Disadvantages of Compilers‬
‭●‬ ‭Slower than interpreters for running programs for the first time.‬
‭●‬ ‭The compiler must be present for the translation process to occur.‬
‭●‬ ‭They can cause the computer to crash.‬
‭●‬ ‭Difficult to find errors in compiled program.‬

*‭ ‬‭NB‬‭:‬ ‭Source‬ ‭Code‬ ‭refers‬ ‭to‬ ‭the‬ ‭program‬ ‭written‬ ‭in‬ ‭English-like‬ ‭statements‬ ‭(High‬
‭Level Language) by the programmer.‬
‭Object‬‭Code‬‭refers‬‭to‬‭a‬‭machine‬‭code‬‭version‬‭o f‬‭a‬‭source‬‭code.‬‭All‬‭programs‬‭written‬
‭in‬ ‭source‬ ‭code‬ ‭must‬ ‭be‬ ‭converted‬ ‭to‬ ‭o bject‬ ‭code‬ ‭for‬ ‭the‬ ‭computer‬ ‭to‬ ‭understand‬
‭them.‬

‭ .‬‭Assemblers‬‭:‬‭These‬‭are‬‭programs‬‭used‬‭to‬‭convert‬‭assembly‬‭language‬‭instructions‬
3
‭into machine language. Other uses of assemblers include:‬
‭●‬ ‭They generate machine code that is equivalent to assembly language.‬
‭●‬ ‭They‬‭are‬‭used‬‭to‬‭check‬‭the‬‭validity‬‭o f‬‭instructions,‬‭that‬‭is,‬‭checking‬‭for‬‭syntax‬
‭errors in an instruction.‬
‭●‬ ‭They also assign memory locations to variables.‬

‭Difference between High Level Languages and Low Level Languages‬

‭ igh Level Language‬


H ‭ ow Level Language‬
L
‭1‬ ‭Written in English like statements‬ ‭Written‬ ‭in‬ ‭1s‬ ‭and‬ ‭0s‬ ‭(machine‬ ‭code)‬ ‭o r‬ ‭in‬
‭mnemonic codes.‬
‭‬
2 ‭Easier to work with‬ ‭Difficult to work with‬
‭3‬ ‭Easier to understand‬ ‭Difficult to understand‬
‭4‬ ‭Are‬‭problem‬‭o riented‬‭and‬‭can‬‭be‬‭used‬ ‭Machine oriented‬
‭o n any computer‬
‭5‬ ‭Slower‬‭in‬‭execution‬‭since‬‭they‬‭need‬‭to‬ ‭Faster‬ ‭in‬ ‭execution‬ ‭since‬ ‭they‬ ‭are‬ ‭in‬ ‭machine‬
‭be‬ ‭first‬ ‭converted‬ ‭to‬ ‭machine‬ ‭code‬ ‭code already.‬
‭before running‬
‭6‬ ‭Occupy‬ ‭large‬ ‭disk‬ ‭storage‬ ‭space‬ ‭o n‬ ‭Occupy‬ ‭small‬ ‭disk‬ ‭storage‬ ‭space‬ ‭o n‬ ‭the‬
‭the computer‬ ‭computer‬
‭7‬ ‭They are machine independent‬ ‭They are machine dependent‬

‭ op-Down Program Design‬


T
‭Refers‬ ‭to‬ ‭the‬‭splitting‬‭o f‬‭a‬‭program‬‭into‬‭simpler‬‭subtasks‬‭called‬‭modules‬‭which‬‭will‬
‭be‬ ‭easier‬ ‭to‬ ‭solve.‬ ‭For‬ ‭example,‬ ‭a‬ ‭program‬ ‭can‬ ‭be‬ ‭split‬ ‭into‬ ‭modules‬ ‭to‬ ‭Accept‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭100‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ umber,‬ ‭Add,‬ ‭Divide,‬ ‭Subtract‬ ‭and‬ ‭to‬ ‭Display‬ ‭Results.‬ ‭Modules‬ ‭are‬ ‭also‬ ‭called‬
N
‭procedures,‬ ‭routines,‬ ‭sub-routines‬ ‭o r‬ ‭functions.‬ ‭The‬ ‭splitting‬ ‭o f‬ ‭a‬ ‭problem‬ ‭into‬ ‭a‬
‭series of self-contained modules is called modularisation (modular programming).‬
‭Advantages of modularisation (modular programming)‬
‭●‬ ‭Programmer can concentrate at one task at a time.‬
‭●‬ ‭Modules are simpler and easier to understand and to solve.‬
‭●‬ ‭Modules are easier to test and to debug.‬
‭●‬ ‭Program‬ ‭modification‬ ‭is‬ ‭easier‬ ‭since‬ ‭changes‬ ‭are‬ ‭isolated‬ ‭with‬ ‭specific‬
‭modules.‬
‭●‬ ‭More experienced programmers can be assigned complex modules.‬
‭●‬ ‭It saves programming time by sharing tasks.‬
‭●‬ ‭A‬ ‭large‬ ‭project‬ ‭will‬ ‭be‬ ‭easier‬ ‭to‬ ‭monitor.‬ ‭It‬ ‭is‬ ‭easier‬ ‭to‬ ‭update‬ ‭(modify)‬
‭modules‬
‭However,‬
‭●‬ ‭It may be difficult to link the modules together.‬
‭●‬ ‭There‬‭could‬‭be‬‭problems‬‭o f‬‭usage‬‭o f‬‭variables‬‭as‬‭similar‬‭variable‬‭names‬‭may‬
‭be referring to different sets of data. They may also vary in scope.‬

*‭ NB:‬ ‭Library‬ ‭programs:‬ ‭this‬ ‭refers‬ ‭to‬ ‭a‬ ‭collection‬ ‭o f‬ ‭standard‬ ‭programs‬ ‭and‬
‭subroutines‬‭that‬‭are‬‭stored‬‭and‬‭available‬‭for‬‭immediate‬‭use‬‭by‬‭o ther‬‭modules‬‭in‬‭the‬
‭system. Library programs are referenced by most modules in the systems.‬
‭*NB:‬ ‭Stepwise‬‭refinement‬‭:‬‭a‬‭technique‬‭used‬‭in‬‭developing‬‭a‬‭system‬‭by‬‭breaking‬‭it‬
‭into modules and then work on the internal working of a module.‬
‭*‬‭NB‬‭:‬ ‭The‬ ‭difference‬ ‭between‬ ‭a‬ ‭procedure‬ ‭and‬ ‭a‬ ‭function‬ ‭is‬ ‭that‬ ‭a‬ ‭procedure‬ ‭is‬ ‭a‬
‭sub-program‬ ‭that‬ ‭do‬ ‭not‬ ‭return‬ ‭a‬ ‭value‬ ‭while‬ ‭a‬ ‭function‬ ‭is‬ ‭a‬ ‭sub-program‬ ‭that‬
‭returns a value.‬

‭ LGORITHMS‬
A
‭A‬ ‭set‬ ‭o f‬ ‭instructions‬ ‭describing‬‭the‬‭steps‬‭followed‬‭in‬‭performing‬‭a‬‭specific‬‭task,‬‭for‬
‭example,‬ ‭calculating‬ ‭change.‬ ‭Algorithms‬ ‭are‬ ‭not‬ ‭necessarily‬ ‭written‬ ‭in‬ ‭any‬ ‭specific‬
‭language. Algorithms can be illustrated using the following:‬
‭Descriptions, Flowcharts, Pseudocodes, Structure diagrams.‬

‭Advantages of algorithms‬
‭-‬ ‭not biased towards any programming language‬
‭-‬ ‭easy to convert to a program code or flowchart‬
‭-‬ ‭easy to determine logic errors‬
‭-‬ ‭has finite steps which lead to a solution‬
‭Disadvantages‬
‭-‬ ‭time consuming to design, i.e. first convert to flowchart, then to program code‬
‭-‬ ‭most people find them difficult to learn‬

‭ .‬‭Descriptions:‬‭These‬‭are‬‭general‬‭statements‬‭that‬‭are‬‭followed‬‭in‬‭o rder‬‭to‬‭complete‬
a
‭a‬‭specific‬‭task.‬‭They‬‭are‬‭not‬‭governed‬‭by‬‭any‬‭programming‬‭language.‬‭An‬‭example‬‭is‬
‭as follows:‬
‭Enter temperature in‬‭o‭C ‬

‭Store the value in box C‬
‭Calculate the equivalent temperature in‬‭o‭F


‭Store the value in box F‬
‭Print the value of box C and F‬
‭End the program.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭101‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ .‬‭Pseudocodes:‬‭These‬‭are‬‭English-like‬‭statements,‬‭closer‬‭to‬‭programming‬‭language‬
b
‭that‬ ‭indicate‬ ‭steps‬ ‭followed‬ ‭in‬ ‭performing‬ ‭a‬ ‭specific‬ ‭task.‬ ‭They‬ ‭are‬ ‭however‬
‭independent of any programming language. An example is as follows:‬
‭Enter centigrade temperature, C‬
‭If C = 0, then stop.‬
‭Set F to 32 + (9C/5)‬
‭Print C and F‬
‭End‬

‭ ARIABLES‬
V
‭Definition‬‭:‬ ‭A‬ ‭variables‬ ‭is‬ ‭a‬‭memory‬‭location‬‭that‬‭can‬‭store‬‭a‬‭value‬‭that‬‭can‬‭change‬
‭during program execution.‬
‭Naming‬ ‭variables‬‭:‬ ‭Each‬ ‭programming‬ ‭language‬ ‭has‬ ‭its‬ ‭own‬ ‭way‬ ‭o f‬ ‭naming‬
‭variables. However, the following conventions are common:‬
‭-‬ ‭a‬ ‭variable‬ ‭should‬ ‭not‬‭be‬‭a‬‭reserved‬‭word.‬‭A‬‭reserved‬‭word‬‭is‬‭a‬‭word‬‭with‬‭a‬
‭specific‬‭meaning‬‭/‬‭function‬‭in‬‭that‬‭programming‬‭language,‬‭e.g.‬‭Print,‬‭else,‬‭are‬
‭reserved words in BASIC‬
‭-‬ ‭Variables must start with an alphabetic character, not with digit.‬
‭-‬ ‭It‬ ‭is‬ ‭wise‬ ‭to‬ ‭name‬ ‭a‬ ‭variable‬ ‭using‬ ‭the‬ ‭data‬ ‭it‬ ‭stores,‬ ‭e.g.‬ ‭surname‬ ‭(to‬ ‭store‬
‭surnames),‬ ‭DOB‬ ‭(to‬ ‭store‬‭a‬‭date‬‭o f‬‭birth),‬‭etc.‬‭Thus‬‭it‬‭must‬‭be‬‭meaningful‬‭to‬
‭avoid confusion‬
‭-‬ ‭Must not be too long‬
‭-‬ ‭Must be one word‬

‭ ontrol Structures in Pseudocode‬


C
‭A‬ ‭number‬ ‭o f‬‭control‬‭structures‬‭are‬‭used‬‭in‬‭designing‬‭Pseudocodes.‬‭These‬‭includes:‬
‭simple sequence, selection and iteration (looping/repetition).‬

i‭ .‬ ‭Simple‬ ‭sequence:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭instructions‬ ‭are‬ ‭executed‬ ‭in‬ ‭the‬ ‭o rder‬ ‭they‬
‭appear‬‭in‬‭a‬‭program‬‭without‬‭jumping‬‭any‬‭o ne‬‭o f‬‭them‬‭up‬‭to‬‭the‬‭end‬‭o f‬‭the‬‭program.‬
‭Statements‬ ‭are‬ ‭executed‬ ‭o ne‬ ‭after‬ ‭another‬ ‭in‬ ‭the‬ ‭o rder‬ ‭they‬ ‭are.‬ ‭It‬ ‭is‬ ‭simple‬ ‭and‬
‭avoids confusion. Example:‬
‭Enter first number, A‬
‭Enter second number, B‬
‭C = A + B‬
‭Print C‬
‭Stop‬
‭ii. Selection Structure:‬
‭This‬ ‭allows‬‭o ne‬‭to‬‭choose‬‭the‬‭route‬‭to‬‭follow‬‭in‬‭o rder‬‭to‬‭accomplish‬‭a‬‭specific‬‭task.‬
‭Selection is written using the IF ....THEN...ELSE statement or the CASE statement.‬

I‭ F...THEN‬ ‭...ELSE‬ ‭statement:‬ ‭A‬ ‭programming‬ ‭structure‬ ‭that‬ ‭allows‬ ‭the‬ ‭user‬ ‭to‬
‭choose‬ ‭o ne‬ ‭from‬ ‭at‬ ‭least‬ ‭two‬ ‭routes‬ ‭o f‬ ‭solving‬ ‭a‬ ‭problem.‬ ‭The‬ ‭following‬
‭Pseudocodes‬‭compares‬‭two‬‭numbers‬‭entered‬‭through‬‭the‬‭keyboard‬‭and‬‭determines‬
‭the bigger one.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭102‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ nter first Number, A‬
E ‭ nter first Number, A‬
E ‭Enter first Number, A‬
‭Enter second number, B‬ ‭Enter second number, B‬
‭Enter second number, B‬
‭IF A>B THEN‬ ‭IF A > B THEN‬
‭Print A is bigger‬ ‭Print A is bigger‬ ‭IF A>B THEN Print A is bigger‬
‭ELSE‬ ‭ENDIF‬
‭IF A<B THEN Print B is bigger‬
‭IF A<B THEN‬ ‭IF A < B THEN‬
‭Print B is bigger‬ ‭Print B is bigger‬ ‭IF A=B THEN Print Numbers are equal‬
‭ELSE‬ ‭ENDIF‬
‭END‬
‭Print Numbers are‬ ‭IF A = B THEN‬
‭equal‬ ‭Print Numbers are equal‬
‭ENDIF‬ ‭ENDIF‬
‭ENDIF‬ ‭END‬
‭END‬
‭The above 3 Pseudocodes produces the same result.‬

‭ ASE‬ ‭Statement:‬ ‭This‬ ‭is‬ ‭an‬ ‭alternative‬ ‭to‬ ‭the‬ ‭IF...THEN...ELSE‬ ‭statement‬ ‭and‬ ‭is‬
C
‭shorter. For example:‬
‭Enter first Number, A‬
‭Enter second number, B‬
‭Enter operand (+, -, * /)‬
‭CASE operand of:‬
‭“+”: C = A + B‬
‭“-”: C = A-B‬
‭“*”: C = A*B‬
‭“/”: C = A/B‬
‭ENDCASE‬
‭Print C‬
‭END‬

I‭ ii. Repetition/Iteration/Looping:‬
‭A‬‭control‬‭structure‬‭that‬‭repeatedly‬‭executes‬‭part‬‭o f‬‭a‬‭program‬‭o r‬‭the‬‭whole‬‭program‬
‭until‬ ‭a‬ ‭certain‬ ‭condition‬ ‭is‬ ‭satisfied.‬ ‭Iteration‬ ‭is‬ ‭in‬ ‭the‬ ‭following‬ ‭forms:‬ ‭FOR...NEXT‬
‭loop, REPEAT... UNTIL Loop and the WHILE...ENDWHILE Loop.‬

‭ .‬‭For...Next‬‭Loop:‬‭A‬‭looping‬‭structure‬‭that‬‭repeatedly‬‭executes‬‭the‬‭loop‬‭body‬‭for‬‭a‬
a
‭specified number of times. The syntax of the For...Next loop is as follows:‬

‭FOR {variable} = {starting value} to {ending value} DO‬


‭Statement 1‬
‭Statement 2‬ ‭loop body‬
‭................‬
‭NEXT {variable}‬

‭ ‬‭group‬‭o f‬‭statements‬‭between‬‭the‬‭looping‬‭structures‬‭is‬‭called‬‭the‬‭loop‬‭body‬‭and‬‭is‬
A
‭the one that is repeatedly executed.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭103‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ he‬ ‭For...Next‬ ‭loop‬‭is‬‭appropriate‬‭when‬‭the‬‭number‬‭o f‬‭repetitions‬‭is‬‭known‬‭well‬‭in‬
T
‭advance,‬ ‭e.g.‬ ‭five‬ ‭times.‬‭An‬‭example‬‭o f‬‭a‬‭program‬‭that‬‭uses‬‭the‬‭For...Next‬‭loop‬‭is‬‭as‬
‭follows:‬
‭Sum, Average = 0‬
‭FOR I = 1 to 5 DO‬
‭Enter Number‬
‭Sum = Sum + number‬
‭NEXT I‬
‭Average = Sum/5‬
‭Display Sum, Average‬
‭End‬

‭ .‬‭Repeat...Until‬‭Structure:‬‭This‬‭is‬‭a‬‭looping‬‭structure‬‭that‬‭repeatedly‬‭executes‬‭the‬
b
‭loop‬ ‭body‬ ‭when‬ ‭the‬ ‭condition‬ ‭set‬ ‭is‬ ‭FALSE‬ ‭until‬ ‭it‬ ‭becomes‬ ‭TRUE.‬ ‭The‬ ‭number‬ ‭o f‬
‭repetitions‬‭may‬‭not‬‭be‬‭known‬‭in‬‭advance‬‭and‬‭the‬‭loop‬‭body‬‭is‬‭executed‬‭at‬‭least‬‭o nce.‬
‭The syntax is as follows:‬
‭Repeat‬
‭Statement 1‬
‭Statement 2 loop body‬
‭................‬
‭Until {Condition}‬
‭For example‬
‭Sum, Average, Count = 0‬
‭Repeat‬
‭Enter Number (999 to end)‬
‭Sum = Sum + Number‬
‭Count = count + 1‬
‭Until Number = 999‬
‭Average = Sum / count‬
‭Print Sum, count, Average‬
‭End‬
‭In the above program:‬
‭-‬ ‭Count‬‭records the number of times the loop body executes.‬
‭-‬ ‭999‬ ‭is‬ ‭used‬ ‭to‬ ‭stop‬ ‭further‬ ‭data‬ ‭entry‬ ‭through‬ ‭the‬ ‭keyboard‬ ‭and‬ ‭thereby‬
‭ending‬ ‭the‬ ‭loop.‬ ‭Such‬ ‭a‬ ‭value‬ ‭that‬ ‭stops‬ ‭further‬ ‭data‬ ‭entry‬ ‭through‬ ‭the‬
‭keyboard thereby terminating a loop is called a‬‭Rogue‬‭value or sentinel‬‭.‬
‭-‬ ‭The‬‭condition‬‭here‬‭is‬‭{‬‭Number‬‭=‬‭999‬‭}.‬‭The‬‭loop‬‭exits‬‭when‬‭the‬‭number‬‭999‬
‭is‬‭entered.‬‭If‬‭999‬‭is‬‭part‬‭o f‬‭the‬‭number‬‭to‬‭be‬‭entered‬‭in‬‭this‬‭program,‬‭then‬‭the‬
‭user‬ ‭has‬ ‭to‬‭split‬‭it‬‭into‬‭two‬‭numbers,‬‭that‬‭is‬‭999‬‭=‬‭990‬‭+‬‭9,‬‭therefore‬‭can‬‭be‬
‭entered separately as 990 and 9.‬
‭-‬ ‭A flag is also used to control the loop. In this case 999 is also a flag.‬
‭NB‬‭.‬‭As‬‭for‬‭the‬‭Repeat...Until‬‭loop,‬‭the‬‭condition‬‭is‬‭tested‬‭after‬‭the‬‭loop‬‭body‬‭has‬‭been‬
‭run‬ ‭at‬ ‭least‬ ‭o nce,‬ ‭even‬ ‭when‬ ‭the‬ ‭condition‬ ‭is‬ ‭true‬ ‭from‬ ‭start.‬ ‭This‬ ‭is‬ ‭rather‬
‭misleading.‬

c‭ .‬‭While‬‭...‬‭Do‬‭Statement:‬‭A‬‭looping‬‭structure‬‭in‬‭which‬‭the‬‭loop‬‭body‬‭is‬‭repeatedly‬
‭executed‬‭when‬‭the‬‭condition‬‭set‬‭is‬‭TRUE‬‭until‬‭it‬‭becomes‬‭FALSE.‬‭It‬‭is‬‭used‬‭when‬‭the‬
‭number‬ ‭o f‬ ‭repetitions‬ ‭is‬ ‭not‬ ‭known‬ ‭in‬ ‭advance.‬ ‭The‬ ‭condition‬ ‭set‬ ‭is‬ ‭tested‬ ‭first‬
‭before‬ ‭execution‬ ‭o f‬‭the‬‭loop‬‭body.‬‭Therefore‬‭the‬‭loop‬‭body‬‭may‬‭not‬‭be‬‭executed‬‭at‬
‭all‬ ‭if‬ ‭the‬ ‭condition‬ ‭set‬ ‭is‬ ‭FALSE‬ ‭from‬ ‭start.‬ ‭The‬ ‭syntax‬ ‭o f‬ ‭the‬ ‭WHILE…END‬ ‭WHILE‬
‭structure is as follows:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭104‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭WHILE {condition}‬
‭Statement 1‬
‭Statement 2 loop body‬
‭................‬
‭ENDWHILE‬

‭An example of the program is as follows:‬


‭Sum, Count, Average = 0‬
‭WHILE Count < 6 DO‬
‭Enter Number‬
‭Sum = Sum + number‬
‭Count = count + 1‬
‭ENDWHILE‬
‭Average = Sum/count‬
‭Display sum, count, average‬
‭END‬

‭ he‬ ‭word‬ ‭WEND‬ ‭can‬ ‭be‬ ‭used‬ ‭to‬ ‭replace‬ ‭the‬ ‭word‬ ‭ENDWHILE‬ ‭in‬ ‭some‬ ‭structures‬
T
‭and therefore is acceptable. The word‬‭Do, after the‬‭condition‬‭is optional.‬

‭Differences between the Repeat...Until and the While…ENDWHILE structures‬

‭ epeat Until Loop‬


R ‭ hile Endwhile Loop‬
W
‭1‬ ‭Loop‬ ‭body‬ ‭is‬ ‭executed‬ ‭when‬ ‭the‬ ‭Loop‬ ‭body‬ ‭is‬ ‭executed‬ ‭when‬ ‭the‬
‭condition‬ ‭set‬ ‭is‬ ‭FALSE‬ ‭until‬ ‭it‬ ‭condition‬ ‭set‬ ‭is‬ ‭TRUE‬ ‭until‬ ‭it‬ ‭becomes‬
‭becomes TRUE‬ ‭FALSE‬
‭2‬ ‭Loop‬ ‭body‬ ‭is‬ ‭executed‬ ‭at‬ ‭least‬ ‭Loop body may not be executed at all‬
‭o nce‬
‭3‬ ‭Condition‬ ‭is‬ ‭tested‬ ‭well‬ ‭after‬ ‭ ondition‬ ‭is‬ ‭tested‬ ‭before‬ ‭execution‬ ‭o f‬
C
‭execution of loop body‬ ‭loop body‬

c‭ . Flowcharts‬
‭It‬ ‭is‬ ‭a‬ ‭diagram‬ ‭used‬‭to‬‭give‬‭details‬‭o n‬‭how‬‭programs‬‭and‬‭procedures‬‭are‬‭executed.‬
‭Flowcharts‬ ‭are‬ ‭drawn‬ ‭using‬ ‭specific‬ ‭symbols,‬ ‭each‬ ‭with‬ ‭its‬ ‭own‬ ‭meaning,‬ ‭as‬ ‭given‬
‭below:‬
‭Symbol‬ ‭Explanation‬
‭Process Symbol‬ ‭- Indicates where some form of processing occur‬

‭ rrow‬
A -‭ Shows directional flow of data (data flow symbol)‬
‭Input /output‬ ‭-‬ ‭Parallelogram‬ ‭in‬ ‭shape.‬ ‭Indicates‬ ‭where‬ ‭data‬ ‭is‬
‭entered‬ ‭and‬ ‭o utput‬ ‭form,‬ ‭either‬ ‭screen‬ ‭display‬‭o r‬
‭printout.‬
‭Terminal‬ ‭-‬ ‭Oval‬ ‭in‬ ‭shape.‬ ‭Indicate‬ ‭the‬ ‭start‬ ‭and‬ ‭stop‬ ‭o f‬ ‭a‬
‭program.‬ ‭Therefore‬ ‭it‬ ‭is‬ ‭written‬ ‭either‬
‭Start/Begin/Stop/End.‬
‭Connector‬ ‭-‬ ‭Circular‬ ‭in‬ ‭shape.‬‭Denotes‬‭the‬‭start‬‭and‬‭end‬‭o f‬‭a‬
‭subroutine. Nothing should be written inside it.‬
‭Pre-defined process‬ ‭Indicates‬ ‭a‬ ‭module/subprogram/procedure‬ ‭inside‬
‭another program‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭105‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Decision‬ ‭ epresents‬ ‭a‬ ‭selection‬ ‭stage.‬ ‭Often‬ ‭used‬ ‭where‬ ‭a‬
R
‭condition‬ ‭is,‬ ‭especially‬ ‭in‬ ‭repetition‬ ‭and‬ ‭selection‬
‭structures.‬

I‭ llustrations of flowcharts for programs‬


‭1. Using Simple Sequence Structure‬
‭ tart‬
S
‭Enter number, A‬
‭Enter number, B‬
‭Sum = A + B‬
‭Display Sum‬
‭Stop‬

‭ seudocode‬ ‭for‬ ‭the‬ ‭flowchart‬ ‭on‬ ‭the‬


P
‭left:‬

‭ lowchart‬ ‭equivalent‬
F ‭to‬ ‭the‬
‭pseudocode on the right‬

‭2. Using Selection Structure‬


‭Flowchart‬ ‭Pseudocode equivalent‬

‭ nter first Number, A‬


E
‭Enter second number, B‬
‭IF A>B THEN‬
‭Print A is bigger‬
‭ELSE‬
‭IF A<B THEN‬
‭Print B is bigger‬
‭ELSE‬
‭Print‬ ‭Numbers‬ ‭are‬
‭equal‬
‭ NDIF‬
E
‭ENDIF‬
‭END‬

‭ . Using Iteration‬
3
‭(a) Repeat ... Until Structure‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭106‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Flowchart‬ ‭ seudocode equivalent‬
P
‭Sum, Average, Count = 0‬
‭Repeat‬
‭Enter Number‬
‭Sum = Sum + Number‬
‭Count = count + 1‬
‭Until Count > 10‬
‭Average = Sum / count‬
‭Display Sum, count, Average‬
‭End‬

‭b) WHILE...WEND Structure and the FOR...TO...NEXT Loop‬

‭Flowchart‬ ‭ seudocode equivalent‬


P
‭Sum, Average, Count = 0‬
‭WHILE‬‭Count <=10‬
‭Enter Number‬
‭Sum = Sum + Number‬
‭Count = count + 1‬
‭WEND‬
‭Average = Sum / count‬
‭Display Sum, count, Average‬
‭END‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭107‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ se of the Pre-defined Symbol and the connector‬
U
‭This is used when drawing flowcharts of subprograms as given below.‬
‭Start‬ ‭Module‬ ‭Accept‬
‭Numbers‬
‭Enter First Number, A‬
‭Enter Second Number, B‬
‭Enter Third Number, C‬
‭End Module‬

‭ .‬ ‭Flowchart‬ ‭for‬ ‭module‬


b
c‭ .‬ ‭Pseudocode‬ ‭for‬ ‭module‬
‭a.‬ ‭Flowchart‬ ‭for‬‭whole‬ ‭Accept Numbers‬ ‭Accept Numbers‬
‭program‬

‭ lowchart‬ ‭(a)‬ ‭above‬ ‭indicates‬ ‭modules‬ ‭named‬ ‭Accept‬ ‭Numbers,‬ ‭Add‬ ‭numbers‬
F
‭Multiply‬ ‭Numbers‬ ‭and‬ ‭Display‬ ‭Results.‬ ‭Flowcharts‬ ‭for‬ ‭individual‬ ‭modules‬ ‭can‬‭then‬
‭be‬ ‭designed‬ ‭as‬ ‭given‬ ‭in‬ ‭diagram‬ ‭(b)‬ ‭above,‬ ‭o nly‬ ‭the‬ ‭first‬ ‭module‬ ‭is‬ ‭indicated.‬ ‭Can‬
‭you do the rest‬‭?‬

‭ .‬ ‭Structure‬ ‭Diagrams:‬ ‭These‬ ‭are‬ ‭diagrams‬ ‭that‬ ‭show‬ ‭relationships‬ ‭between‬


d
‭different modules as given below.‬
‭Start‬
‭Sum, Product = 0‬
‭Enter First Number, A‬
‭Enter Second Number, B‬
‭Sum = A + B‬
‭Product = A * B‬
‭Display Sum, Product‬
‭End‬

‭ he‬ ‭structure‬ ‭diagram‬ ‭above‬ ‭indicates‬ ‭five‬ ‭sub-programs‬ ‭o f‬ ‭the‬ ‭program‬ ‭Process‬
T
‭Numbers,‬ ‭namely‬ ‭Initialise,‬ ‭Accept‬ ‭Numbers,‬ ‭Process‬‭Numbers,‬‭Display‬‭Results‬‭and‬
‭Exit.‬ ‭The‬ ‭module‬ ‭Process‬ ‭Numbers‬ ‭has‬ ‭its‬ ‭own‬ ‭sub-programs,‬ ‭which‬ ‭are‬ ‭Add‬
‭Numbers‬ ‭and‬ ‭Multiply‬ ‭Numbers.‬ ‭Modules‬‭are‬‭appropriate‬‭for‬‭very‬‭large‬‭programs.‬
‭Can‬‭you‬‭write‬‭pseudocode‬‭for‬‭individual‬‭modules?‬‭The‬‭program‬‭can‬‭be‬‭written‬‭as‬‭a‬
‭continuous single program as indicated on the right side of the diagram.‬

I‭ nterpreting and Testing Programs‬


‭Dry‬ ‭running‬ ‭(desk‬ ‭c hecking)‬‭:‬ ‭the‬ ‭process‬ ‭o f‬ ‭manually‬ ‭testing‬ ‭the‬ ‭logic‬ ‭o f‬ ‭a‬
‭program‬‭o n‬‭paper‬‭before‬‭coding‬‭o n‬‭the‬‭computer.‬‭Dry‬‭running‬‭is‬‭done‬‭to‬‭determine‬
‭the logic of a program (to check if it gives intended results.)‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭108‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ebugging‬‭:‬ ‭The‬ ‭process‬ ‭o f‬ ‭finding‬ ‭and‬ ‭correcting‬ ‭errors‬ ‭in‬ ‭a‬ ‭program.‬ ‭Bugs‬ ‭are‬
D
‭errors‬‭in‬‭a‬‭program.‬‭A‬‭debugger‬‭is‬‭a‬‭program‬‭used‬‭in‬‭aiding‬‭the‬‭finding‬‭and‬‭removal‬
‭o f errors in a program.‬

‭ rogramming Errors‬
P
‭Programming errors are grouped into:‬
‭i.‬‭Syntax‬‭error‬‭:‬‭this‬‭is‬‭an‬‭error‬‭o f‬‭violating‬‭the‬‭grammatical‬‭rules‬‭governing‬‭sentence‬
‭construction‬‭in‬‭a‬‭certain‬‭programming‬‭language,‬‭for‬‭example,‬‭leaving‬‭a‬‭semi-colon‬‭at‬
‭the‬‭end‬‭o f‬‭each‬‭line‬‭in‬‭Pascal.‬‭Syntax‬‭errors‬‭are‬‭detected‬‭by‬‭the‬‭computer.‬‭A‬‭program‬
‭cannot run with syntax errors.‬
‭ii.‬ ‭Logic‬ ‭error‬ ‭(Semantic‬ ‭error)‬‭:‬ ‭refers‬ ‭to‬ ‭an‬ ‭error‬ ‭in‬ ‭the‬ ‭sequencing‬ ‭o f‬
‭instructions,‬ ‭modules‬ ‭and‬ ‭specifying‬ ‭wrong‬ ‭formulae‬‭that‬‭will‬‭produce‬‭undesirable‬
‭results.‬ ‭For‬ ‭example,‬ ‭instructing‬ ‭the‬ ‭computer‬ ‭to‬ ‭display‬ ‭result‬ ‭before‬ ‭any‬
‭processing‬ ‭has‬ ‭been‬ ‭done.‬ ‭Logic‬ ‭errors‬ ‭cannot‬ ‭be‬ ‭detected‬ ‭by‬ ‭the‬ ‭computer.‬ ‭The‬
‭user just finds wrong and unintended results of a process.‬
‭iii.‬ ‭Runtime‬ ‭(execution)‬ ‭error‬‭:‬ ‭These‬ ‭are‬ ‭errors‬ ‭that‬ ‭o ccur‬ ‭during‬ ‭program‬
‭execution‬‭and‬‭can‬‭be‬‭generated‬‭when‬‭the‬‭computer‬‭tries‬‭to‬‭read‬‭past‬‭an‬‭end‬‭o f‬‭file‬
‭marker or by dividing a number by zero.‬

‭ ATA TESTING‬
D
‭After‬ ‭a‬ ‭program‬ ‭has‬ ‭been‬ ‭coded,‬ ‭it‬ ‭must‬ ‭be‬ ‭tested‬ ‭with‬ ‭different‬ ‭data‬ ‭types‬ ‭to‬
‭determine‬ ‭if‬ ‭intended‬ ‭results‬ ‭are‬ ‭produced.‬‭The‬‭types‬‭o f‬‭test‬‭data‬‭that‬‭can‬‭be‬‭used‬
‭include:‬
‭i.‬‭Extreme‬‭Data(boundary‬‭data/border‬‭line‬‭data)‬‭:‬‭Refers‬‭to‬‭the‬‭minimum‬‭and‬‭the‬
‭maximum‬ ‭values‬ ‭in‬ ‭a‬ ‭given‬ ‭range.‬ ‭For‬ ‭example,‬ ‭a‬ ‭computer‬ ‭program‬ ‭requires‬ ‭the‬
‭user‬ ‭to‬ ‭enter‬ ‭any‬ ‭number‬ ‭from‬ ‭(between)‬ ‭1‬ ‭to‬ ‭20.‬‭1‬‭and‬‭20‬‭are‬‭extreme‬‭data‬‭and‬
‭the computer must accept these. Thus extreme data is accepted by the computer.‬
‭ii.‬‭Standard‬‭(normal)‬‭Data‬‭:‬‭This‬‭refers‬‭to‬‭data‬‭that‬‭lies‬‭within‬‭(in-between)‬‭a‬‭given‬
‭range.‬ ‭In‬ ‭o ur‬ ‭example‬ ‭above,‬ ‭the‬ ‭numbers‬ ‭from‬‭2‬‭to‬‭19‬‭are‬‭standard‬‭data‬‭and‬‭are‬
‭accepted by the computer.‬
‭iii.‬ ‭Abnormal‬ ‭Data‬‭:‬ ‭This‬ ‭refers‬ ‭to‬ ‭data‬ ‭o utside‬ ‭a‬ ‭given‬ ‭range.‬ ‭As‬ ‭to‬ ‭o ur‬ ‭example‬
‭above,‬‭the‬‭number‬‭0,‬‭-1,‬‭-50‬‭and‬‭all‬‭number‬‭from‬‭21‬‭and‬‭above‬‭are‬‭abnormal‬‭data.‬
‭The computer system gives/displays an error message if abnormal data is entered.‬

‭ esting Strategies‬
T
‭First step involves testing of the programs and various modules individually, e.g.‬
‭-‬‭Top-Down testing‬‭: program is tested with limited‬‭functionality. Most functions are‬
‭replaced with stubs that contain code. Functions are gradually added to the program‬
‭until the complete program is tested.‬
‭-‬‭Bottom – up testing‬‭: Each function is tested individually‬‭and then combined to test‬
‭the complete program.‬
‭-‬‭Black-box testing‬‭:‬
‭-‬ ‭Program is regarded as a black box and is tested according to its specification.‬
‭-‬ ‭No account is taken of the way the program is written‬
‭-‬ ‭Different values are entered for variables to determine whether the program‬
‭can cope with them. This includes standard (typical/normal), extreme‬
‭(borderline) and abnormal data values.‬
‭-‬‭White-box testing‬‭:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭109‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ E ‭ ach path through the program is tested to ensure that all lines of code work‬
‭perfectly.‬
‭●‬ ‭Involves testing the program to determine whether all possible paths through‬
‭the program produce desired results‬
‭●‬ ‭Mostly appropriate if the program has different routes through it, i.e. uses‬
‭selection control structure and loops‬
‭●‬ ‭Involves testing of logical paths through the code‬
‭●‬ ‭Involves testing of the structure and logic of the program (if it has logical‬
‭errors)‬
‭●‬ ‭Involves desk checking (dry running)‬
‭-‬‭Alpha testing‬‭:‬
‭●‬ ‭The first testing done within the developers company (at owners’ laboratory).‬
‭●‬ ‭Testing is done by members of the software company‬
‭●‬ ‭Some errors may still be in existence after alpha testing as the testers are‬
‭programmers not users.‬
‭●‬ ‭The software version will be unfinished‬
‭●‬ ‭Testers have knowledge of the software and of programming‬
‭-‬‭Beta testing‬‭: System testing done after alpha testing;‬‭in which the program version‬
‭is released to a number of privileged customers in exchange of their constructive‬
‭comments. Mostly similar to the finally released version.‬

‭ ystem testing‬
S
‭Once a program is tested, it is installed and the analyst can now test it. A very large‬
‭program must be tested using the following types of tests:‬

‭ .‬‭Unit testing‬‭: the process of testing each program‬‭unit (sub-routine/module in a‬


1
‭suite) singly to determine if it produces expected results.‬
‭2.‬‭Integration Testing‬‭: testing to see if modules‬‭can combine with each other and‬
‭work as expected. The whole program is tested to determine if its module integrate‬
‭perfectly‬
‭3.‬‭System testing‬‭: the testing of the whole program‬‭after joining the modules to‬
‭determine if it runs perfectly.‬
‭4.‬‭User acceptance testing‬‭: determining if users of‬‭the new system are prepared to‬
‭use it. Usually the final step. It enables identification of some bugs related to usability.‬
‭User gain the confidence that the program being ushered meets their requirements‬

‭HUMAN – COMPUTER INTERFACES‬


I‭ nterface‬‭:‬ ‭A‬ ‭form‬ ‭o f‬ ‭communication‬ ‭between‬ ‭the‬ ‭user‬ ‭and‬ ‭the‬ ‭computer,‬ ‭for‬
‭example‬ ‭Graphical‬ ‭User‬ ‭Interface.‬ ‭It‬ ‭is‬ ‭the‬ ‭o perating‬ ‭environment‬ ‭presented‬‭to‬‭the‬
‭user‬ ‭by‬ ‭the‬ ‭computer‬ ‭system‬ ‭for‬ ‭interaction‬ ‭purposes.‬ ‭A‬ ‭program‬ ‭that‬ ‭is‬ ‭easy‬ ‭to‬
‭learn‬ ‭and‬ ‭to‬ ‭use‬ ‭is‬ ‭said‬ ‭to‬ ‭be‬ ‭user‬ ‭friendly.‬ ‭A‬ ‭user‬ ‭friendly‬ ‭interface‬ ‭has‬ ‭the‬
‭following‬‭features‬‭:‬
‭●‬ ‭It is easy for a user to start using the system, especially for beginners.‬
‭●‬ ‭The‬ ‭system‬ ‭should‬ ‭be‬ ‭self-contained‬ ‭so‬ ‭that‬ ‭users‬ ‭are‬ ‭not‬ ‭forced‬ ‭to‬ ‭access‬
‭manuals.‬
‭●‬ ‭Minimum effort must be used for the user to complete required tasks.‬
‭●‬ ‭It should have minimum errors and unexpected results. Thus must be reliable.‬
‭●‬ ‭It should be logical and consistent, allowing the user to learn it faster.‬
‭●‬ ‭It is intuitive to use.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭110‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ‬ ‭Help is available.‬

‭●‬ ‭Can use menus, wizards, sound and colour to assist the user.‬
‭User‬‭friendly‬‭programs‬‭usually‬‭display‬‭windows,‬‭icons,‬‭menus,‬‭pointers‬‭and‬‭dialogue‬
‭boxes.‬

‭An interface can contain the following:‬


‭●‬ ‭Window‬‭: - A rectangular area on the screen which displays‬‭text or images.‬
‭●‬ ‭Icon‬‭:‬ ‭-‬ ‭Small‬ ‭image‬ ‭o n‬ ‭the‬ ‭screen‬ ‭that‬ ‭represent‬ ‭a‬ ‭file,‬ ‭folder,‬ ‭command‬ ‭o r‬
‭any‬‭o bject‬‭that‬‭can‬‭be‬‭manipulated‬‭by‬‭the‬‭user,‬‭like‬‭the‬‭My‬‭Computer‬‭icon‬‭o n‬
‭the desktop.‬
‭●‬ ‭Menu‬‭: - a list of options from which the user could‬‭select one.‬
‭●‬ ‭Pointer‬‭:‬‭-‬‭Arrow‬‭appearing‬‭o n‬‭the‬‭screen‬‭that‬‭is‬‭moved‬‭by‬‭moving‬‭the‬‭mouse‬
‭to point, select or open an icon.‬
‭●‬ ‭Static‬‭Menu‬‭:‬‭-‬‭Menu‬‭that‬‭appear‬‭o n‬‭the‬‭screen‬‭most‬‭o f‬‭the‬‭time,‬‭for‬‭example‬
‭File, Edit, View, etc, which are found in Microsoft Word.‬
‭●‬ ‭Pull Down Menu‬‭: - a list of options that are listed‬‭going downwards.‬
‭●‬ ‭Pop-up‬ ‭menu‬‭:‬ ‭-‬ ‭A‬ ‭list‬ ‭o f‬ ‭o ptions‬ ‭that‬ ‭appear‬ ‭which‬ ‭you‬ ‭right‬ ‭click‬ ‭o n‬ ‭an‬
‭empty space on the screen.‬
‭●‬ ‭Dialogue‬‭box‬‭:‬‭-‬‭A‬‭rectangular‬‭area‬‭with‬‭many‬‭windows‬‭that‬‭prompts‬‭the‬‭user‬
‭to provide data.‬
‭●‬ ‭Prompt‬‭:‬‭-‬‭a‬‭screen‬‭display‬‭that‬‭allows‬‭the‬‭user‬‭to‬‭enter‬‭a‬‭command‬‭by‬‭typing‬
‭as in MS-DOS mode. A prompt may appear as C:>-‬
‭●‬ ‭Cursor‬‭:‬ ‭-‬ ‭a‬ ‭blinking‬ ‭arrow‬ ‭that‬ ‭shows‬ ‭an‬ ‭insertion‬ ‭point‬ ‭o n‬ ‭the‬ ‭screen‬
‭showing where text will appear when typing as in Microsoft Word.‬
‭●‬ ‭Scroll‬ ‭bar‬‭:‬ ‭-‬ ‭A‬ ‭vertical‬ ‭o r‬ ‭horizontal‬ ‭bar‬ ‭that‬ ‭is‬ ‭moved‬ ‭up‬ ‭and‬‭down‬‭o r‬‭left‬
‭and right respectively, to view text on the screen.‬
‭●‬ ‭Text‬ ‭box‬‭:‬ ‭-‬ ‭In‬ ‭a‬ ‭dialog‬ ‭box,‬ ‭a‬ ‭box‬ ‭in‬ ‭which‬ ‭you‬ ‭type‬ ‭information‬ ‭needed‬ ‭to‬
‭carry‬ ‭o ut‬ ‭a‬ ‭command.‬ ‭The‬ ‭text‬ ‭box‬ ‭may‬ ‭be‬ ‭blank‬ ‭o r‬‭may‬‭contain‬‭text‬‭when‬
‭the dialog box opens.‬

‭ ypes Of User Interfaces‬


T
‭1.‬ ‭Graphical‬ ‭User‬ ‭Interface‬ ‭(GUI):‬‭It‬‭is‬‭a‬‭way‬‭o f‬‭communication‬‭between‬‭the‬‭user‬
‭and‬ ‭the‬ ‭computer‬ ‭by‬ ‭use‬ ‭o f‬ ‭Windows,‬ ‭Icons,‬ ‭Menus‬ ‭and‬ ‭Pointers‬ ‭(WIMP)‬ ‭as‬
‭supported‬ ‭by‬ ‭Microsoft‬ ‭Windows‬ ‭XP‬ ‭o perating‬ ‭system.‬ ‭Programs‬ ‭that‬ ‭provide‬ ‭a‬
‭graphical‬‭user‬‭interface‬‭include‬‭Microsoft‬‭Word‬‭2003,‬‭Windows‬‭XP.‬‭The‬‭user‬‭moves‬
‭a‬ ‭mouse‬ ‭and‬ ‭point‬ ‭o n‬ ‭required‬ ‭o ptions‬‭and‬‭then‬‭click.‬‭It‬‭has‬‭commands‬‭in‬‭form‬‭o f‬
‭icons‬‭which‬‭have‬‭the‬‭name‬‭o f‬‭the‬‭command‬‭o r‬‭file‬‭below‬‭the‬‭icon.‬‭The‬‭mouse‬‭is‬‭the‬
‭most used device in this system. Suitable for users with lower computing skills‬

‭Advantages of GUI:‬
‭●‬ ‭It is faster to give/select commands by just clicking.‬
‭●‬ ‭It is easier for a novice (beginner) to use the system right away.‬
‭●‬ ‭It‬‭is‬‭user‬‭friendly‬‭(this‬‭is‬‭an‬‭interface‬‭that‬‭is‬‭easy‬‭to‬‭learn,‬‭understand‬‭and‬‭to‬
‭use).‬
‭●‬ ‭There is no need for users to remember commands of the language.‬
‭●‬ ‭It avoids typing errors since no typing is involved.‬
‭●‬ ‭It is easier and faster for user to switch between programs and files.‬
‭●‬ ‭A novice (beginner) can use the system right away.‬

‭Disadvantages of GUI:‬
‭●‬ ‭The‬‭icons‬‭o ccupy‬‭a‬‭lot‬‭o f‬‭disk‬‭storage‬‭space‬‭that‬‭might‬‭be‬‭used‬‭for‬‭storage‬‭o f‬
‭data.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭111‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭‬
● ‭ ccupy more main memory than command driven interfaces.‬
O
‭●‬ ‭Run slowly in complex graphics and when many windows are open.‬
‭●‬ ‭Irritate to use for simple tasks due to a greater number of operations needed.‬
‭●‬ ‭Usually only predefined choice are available.‬

‭ .‬ ‭Command‬ ‭(‬ ‭Driven(Line)‬ ‭Interface/Character‬ ‭based‬ ‭Interface:‬ ‭This‬ ‭is‬ ‭an‬


2
‭interface‬ ‭which‬ ‭allows‬ ‭the‬ ‭user‬ ‭to‬ ‭type‬ ‭the‬ ‭command‬ ‭to‬ ‭be‬ ‭carried‬ ‭o ut‬ ‭by‬ ‭the‬
‭computer‬ ‭through‬ ‭the‬ ‭keyboard‬ ‭as‬ ‭supported‬ ‭by‬ ‭MS-DOS.‬ ‭Thus‬ ‭communication‬
‭between‬ ‭the‬ ‭user‬ ‭and‬ ‭the‬‭computer‬‭is‬‭through‬‭typed‬‭commands.‬ ‭The‬‭command‬‭to‬
‭be‬‭o beyed‬‭must‬‭be‬‭typed‬‭correctly;‬‭o therwise‬‭it‬‭will‬‭not‬‭be‬‭o beyed.‬‭Usually‬‭displays‬
‭prompt;‬ ‭which‬ ‭are‬ ‭characters‬ ‭displayed‬ ‭o n‬ ‭computer‬ ‭screen‬ ‭to‬ ‭let‬ ‭the‬ ‭user‬ ‭know‬
‭that a command is required; e.g.‬
‭C:>_‬
‭This is the C-prompt, on the user can type the command in front, e.g.‬
‭C:>copy:\computernotes.doc D:\KapondeniT‬

‭ he‬ ‭user‬ ‭has‬ ‭to‬ ‭remember‬ ‭the‬ ‭commands‬ ‭to‬ ‭be‬ ‭typed‬ ‭when‬ ‭performing‬ ‭a‬‭specific‬
T
‭task.‬‭An‬‭example‬‭o f‬‭a‬‭program‬‭that‬‭uses‬‭command‬‭driven‬‭interface‬‭is‬‭Microsoft‬‭Disk‬
‭Operating‬ ‭System‬ ‭(MS-DOS).‬ ‭The‬ ‭commands‬ ‭are‬‭abbreviated‬‭and‬‭short‬‭e.g.‬‭Del‬‭(for‬
‭delete), copy, print, etc.‬
‭Command‬ ‭Line‬ ‭interface‬ ‭is‬ ‭ideal‬ ‭for‬ ‭programmers‬ ‭and‬ ‭technically‬ ‭competent‬
‭personnel.‬
‭Advantages of Command Driven Interface:‬
‭●‬ ‭It saves disk storage space since there are no icons involved.‬
‭●‬ ‭It‬ ‭is‬ ‭very‬ ‭fast‬ ‭in‬ ‭executing‬ ‭the‬ ‭commands‬ ‭given‬ ‭o nce‬ ‭the‬ ‭user‬ ‭mastered‬ ‭the‬
‭commands.‬
‭●‬ ‭It saves time if the user knows the commands by heart.‬

‭Disadvantages of Command Driven Interface:‬


‭●‬ ‭It takes too long for the user to master all the commands by heart.‬
‭●‬ ‭It is less user friendly.‬
‭●‬ ‭Do not tolerate mistakes‬
‭●‬ ‭More suited to experienced users like programmers.‬
‭●‬ ‭Commands‬ ‭for‬ ‭different‬ ‭software‬ ‭packages‬ ‭are‬ ‭rarely‬ ‭the‬‭same‬‭and‬‭this‬‭will‬
‭lead to mix-up of commands by the user.‬
‭●‬ ‭It‬ ‭is‬ ‭intimidating‬ ‭for‬ ‭normal‬‭computer‬‭users‬‭and‬‭beginners.‬‭Therefore‬‭is‬‭not‬
‭the best for normal applications‬

‭ .‬ ‭Menu‬ ‭Driven‬ ‭Interface:‬ ‭This‬ ‭type‬ ‭o f‬ ‭interface‬ ‭displays‬ ‭a‬ ‭list‬ ‭o f‬ ‭o ptions‬ ‭/‬
3
‭commands‬‭from‬‭which‬‭the‬‭user‬‭has‬‭to‬‭choose‬‭o ne‬‭by‬‭use‬‭o f‬‭the‬‭mouse‬‭o r‬‭keyboard.‬
‭Below is an illustration of a menu driven type of interface:‬
‭1.‬ ‭PRINT RECORD‬
‭2.‬ ‭DISPLAY RECORD‬
‭3.‬ ‭DELETE RECORD‬
‭4.‬ ‭EDIT RECORD‬
‭5.‬ ‭MY OPTION IS: __‬

‭ he user has to enter 1, 2, 3 or 4 and then press enter on the keyboard.‬


T
‭Advantages of Menu Driven Interface:‬
‭●‬ ‭It is fast in carrying out task.‬
‭●‬ ‭The user does not need to remember the commands by heart.‬
‭●‬ ‭It is very easy to learn‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭112‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ ‭No need to consult manual‬

‭Disadvantages of Menu Driven Interface:‬


‭●‬ ‭The‬‭user‬‭is‬‭restricted‬‭to‬‭those‬‭few‬‭o ptions‬‭available‬‭and‬‭thus‬‭is‬‭not‬‭flexible‬‭to‬
‭use.‬
‭●‬ ‭The intended option can be a submenu, which may slow down operations‬

‭Characteristics of a Good User Interface‬


‭-‬ ‭Should have consistent menu structures‬
‭-‬ ‭Forgiving‬‭: should not be too strict as users can make‬‭mistakes. Thus should‬
‭allow users to undo some actions.‬
‭-‬ ‭Familiar‬‭: should be similar especially for programs‬‭designed by the same‬
‭company‬
‭-‬ ‭Attractive‬‭: Maybe by use of good colour, layout, etc‬
‭-‬ ‭Efficient‬‭: must perform functions faster and with‬‭less effort.‬
‭-‬ ‭Should be clear in terms of labelling and naming its use. Names should not be‬
‭vague‬
‭-‬ ‭Legibility‬

‭DATABASES‬
‭ ‬ ‭Database‬ ‭is‬ ‭a‬ ‭collection‬ ‭o f‬ ‭related‬ ‭and‬ ‭o rganised‬ ‭files‬‭sharable‬‭among‬‭computer‬
A
‭users‬ ‭o f‬ ‭an‬ ‭o rganisation.‬ ‭Databases‬ ‭enable‬ ‭addition,‬ ‭deletion‬ ‭and‬ ‭modification‬ ‭o f‬
‭data held in the computer.‬

‭Building Block of Computerised Databases‬

‭-‬‭Bit‬‭: A single binary digit like 0 or 1.‬

-‭ ‬ ‭Nibble‬‭:‬ ‭A‬ ‭group‬ ‭o f‬ ‭4‬ ‭bits,‬‭which‬‭is‬‭half‬‭a‬‭byte,‬‭eg‬


‭1001.‬

-‭ ‬ ‭Byte‬‭:‬ ‭A‬ ‭group‬ ‭o f‬ ‭eight‬ ‭bits‬ ‭representing‬ ‭a‬


‭character for example 10010110‬

-‭ ‬‭Field‬‭:‬‭A‬‭specific‬‭category‬‭o f‬‭information‬‭in‬‭a‬‭table‬
‭(database), for example Surname, Date of Birth, etc‬

-‭ ‬‭Record‬‭:‬‭A‬‭collection‬‭o f‬‭related‬‭fields‬‭describing‬‭an‬
‭entity, e.g patient.‬

‭-‬‭File‬‭: A collection of related records‬

‭-‬‭Database‬‭: A collection of related files‬

‭ ‬ ‭database‬ ‭system‬ ‭(elements)‬ ‭is‬ ‭made‬ ‭up‬ ‭o f‬ ‭stored‬ ‭data,‬ ‭software‬ ‭to‬ ‭maintain‬ ‭the‬
A
‭database, procedures and the person working with the database.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭113‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ atabase Management System (DBMS)‬
D
‭It‬‭is‬‭a‬‭layer‬‭o f‬‭software‬‭used‬‭to‬‭create,‬‭maintain‬‭the‬‭database‬‭and‬‭provides‬‭interface‬
‭between‬ ‭the‬ ‭database‬ ‭and‬ ‭application‬ ‭programs.‬ ‭It‬ ‭allocates‬ ‭storage‬ ‭to‬ ‭data.‬ ‭The‬
‭DBMS‬‭maintains‬‭data‬‭by:‬‭adding‬‭new‬‭records,‬‭deleting‬‭unwanted‬‭records,‬‭amending‬
‭records.‬
‭Data in databases can be accessed using different programming languages.‬
‭DBMS facilities:‬
‭●‬ ‭Processing of files in serial or sequential order.‬
‭●‬ ‭Processing of records.‬
‭●‬ ‭Retrieval of records‬
‭DBMS provides security to data in the database by:‬
‭●‬ ‭Protecting data against unauthorised access using passwords.‬
‭●‬ ‭Safeguarding data against corruption.‬
‭●‬ ‭All‬ ‭transaction‬ ‭between‬ ‭the‬ ‭database‬ ‭and‬ ‭the‬ ‭user‬ ‭are‬ ‭done‬ ‭through‬ ‭the‬
‭DBMS.‬

‭ ommunicating with the database‬


C
‭Some‬ ‭databases‬ ‭have‬ ‭their‬ ‭own‬ ‭computer‬ ‭languages.‬ ‭For‬ ‭all‬ ‭the‬‭data‬‭in‬‭databases,‬
‭data‬ ‭descriptions‬ ‭must‬ ‭be‬ ‭provided.‬ ‭Data‬ ‭Description‬ ‭Languages‬ ‭(DDL)‬ ‭are‬
‭provided as well as the Data Manipulation Language (DML)‬
‭*‬‭NB‬‭:‬ ‭DDL‬‭-‬ ‭Refers‬ ‭to‬ ‭the‬ ‭language‬ ‭that‬ ‭allows‬ ‭users‬ ‭to‬ ‭describe‬ ‭data‬ ‭held‬ ‭in‬ ‭the‬
‭computer (data about data) (data used to describe data).‬
‭DML‬‭: Language used to retrieve, sort, .. data in‬‭databases.‬
‭A‬ ‭combination‬ ‭o f‬ ‭the‬ ‭DDL‬ ‭and‬ ‭the‬ ‭DML‬ ‭is‬ ‭called‬ ‭a‬ ‭Data‬ ‭Sub-Language‬ ‭(DSL)‬ ‭o r‬ ‭a‬
‭Query Language. The most common DSL is the Structured Query Language (SQL)‬

‭ he Database Administrator (DBA)‬


T
‭This‬ ‭is‬ ‭a‬ ‭person‬ ‭appointed‬ ‭to‬ ‭manage‬ ‭the‬ ‭database‬ ‭and‬ ‭ensures‬ ‭that‬ ‭the‬‭database‬
‭meets‬ ‭the‬ ‭needs‬ ‭o f‬ ‭the‬ ‭o rganisation.‬ ‭The‬ ‭DBA‬ ‭is‬ ‭supposed‬ ‭to‬ ‭have‬ ‭software‬ ‭and‬
‭managerial skills. The‬‭responsibilities‬‭o f the‬‭DBA‬‭are:‬
‭●‬ ‭Ensuring that the database meets the needs of the organisation.‬
‭●‬ ‭Setting up the database.‬
‭●‬ ‭Control, manage and maintain the database.‬
‭●‬ ‭Define, implement and control database storage.‬
‭●‬ ‭Ensure that policies and procedures are established.‬
‭●‬ ‭Guarantee effective production, control and use of data.‬
‭●‬ ‭Define‬ ‭the‬ ‭strategy‬ ‭o f‬ ‭backup‬ ‭storage‬ ‭and‬ ‭recovering‬ ‭from‬ ‭system‬
‭breakdown.‬
‭●‬ ‭Supervise amendments to the database.‬
‭●‬ ‭Ensures that the data is secure from unauthorised access.‬

‭ ypes Of Databases (Database Models)‬


T
‭These includes relational, hierarchical and network databases‬
‭1.‬ ‭Relational‬ ‭databases:‬ ‭These‬ ‭are‬ ‭database‬‭that‬‭o rganises‬‭data‬‭in‬‭a‬‭table‬‭format,‬
‭consisting‬‭o f‬‭related‬‭data‬‭in‬‭another‬‭file,‬‭allowing‬‭users‬‭to‬‭link‬‭the‬‭files‬‭together.‬‭Each‬
‭column‬ ‭represents‬ ‭an‬ ‭attribute‬ ‭(characteristic‬ ‭o r‬ ‭field).‬ ‭Each‬ ‭row‬ ‭represents‬ ‭a‬
‭record (or tuple), as shown below.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭114‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ elational‬ ‭databases‬ ‭o rganise‬ ‭data‬ ‭in‬ ‭a‬ ‭flexible‬ ‭manner.‬ ‭They‬ ‭are‬ ‭also‬ ‭simple‬ ‭to‬
R
‭construct‬ ‭and‬ ‭are‬ ‭easy‬ ‭to‬ ‭use.‬ ‭However,‬ ‭it‬ ‭may‬ ‭be‬ ‭difficult‬ ‭to‬ ‭come‬ ‭up‬ ‭with‬
‭relationships.‬
‭From the above database structure, it can be noticed that:‬
‭-‬‭There‬‭are‬‭three‬‭records‬‭for‬‭Kapondeni,‬‭Turugari‬‭and‬‭Moyo.‬‭A‬‭record‬‭is‬‭also‬‭called‬
‭a‬‭tuple‬‭.‬
‭- There are four fields: Student Number, Surname, First Name and Date of Birth.‬
‭-‬ ‭The‬ ‭student‬ ‭Number‬ ‭is‬ ‭used‬ ‭as‬ ‭a‬ ‭Primary‬ ‭Key‬ ‭(Key‬ ‭field)‬ ‭because‬ ‭it‬ ‭gives‬ ‭a‬
‭unique(one)‬‭record.‬‭A‬‭primary‬‭key‬‭is‬‭a‬‭field‬‭that‬‭is‬‭used‬‭to‬‭identify‬‭a‬‭unique‬‭record‬
‭from‬ ‭a‬‭database.‬‭All‬‭o ther‬‭fields‬‭from‬‭the‬‭above‬‭database‬‭are‬‭not‬‭appropriate‬‭for‬‭a‬
‭key‬ ‭field‬ ‭because‬ ‭they‬ ‭can‬ ‭identify‬ ‭more‬ ‭than‬ ‭o ne‬‭record.‬‭That‬‭is‬‭surnames‬‭can‬‭be‬
‭similar for 2 or more people as well as date of birth.‬
‭*NB:‬ ‭Concatenated‬ ‭key‬‭:‬ ‭the‬ ‭combination‬ ‭o f‬ ‭two‬ ‭o r‬ ‭more‬ ‭fields‬ ‭in‬ ‭a‬ ‭database‬ ‭in‬
‭o rder‬ ‭to‬ ‭identify‬ ‭a‬ ‭unique‬ ‭record,‬ ‭e.g.‬ ‭using‬ ‭the‬ ‭Surname,‬ ‭First‬ ‭Name‬ ‭and‬ ‭Date‬ ‭o f‬
‭Birth in search of one record.‬
‭*NB:‬ ‭Secondary‬ ‭Key‬‭:‬ ‭A‬ ‭field‬ ‭used‬‭to‬‭identify‬‭more‬‭than‬‭o ne‬‭record‬‭at‬‭a‬‭time,‬‭e.g.‬‭a‬
‭surname.‬
‭*NB:‬‭Attribute‬‭: A characteristic of a record, e.g.‬‭its surname, date of birth.‬
‭Entity‬‭:‬‭any‬‭o bject‬‭o r‬‭event‬‭about‬‭which‬‭data‬‭can‬‭be‬‭collected,‬‭e.g.‬‭a‬‭patient,‬‭student,‬
‭football match, etc.‬

‭ ata types for fields can be:‬


D
‭- Numeric‬‭: consists of digits 0-9 only (negative or‬‭positive), 12, 900, -50, etc‬
‭-‬ ‭Alphabetic‬‭:‬ ‭Consists‬ ‭o f‬ ‭letters‬‭o f‬‭the‬‭alphabet‬‭(a-z,‬‭lowercase‬‭o r‬‭uppercase)‬‭o nly,‬
‭for example a person’s name, like‬‭Tungamirai‬‭.‬
‭-‬ ‭Alphanumeri‬‭c:‬ ‭Combination‬ ‭o f‬ ‭digits‬ ‭and‬ ‭letters‬ ‭o f‬ ‭the‬ ‭alphabet,‬ ‭eg.‬ ‭National‬
‭Identification Number, like 27-134575-C-27‬
‭- Text‬‭: Combination of digits and letters of the alphabet.‬
‭- String‬‭: Combination of digits and letters of the‬‭alphabet‬
‭- Currency‬‭: in monetary value, e.g. $10.00‬
‭- Date/time‬‭: shows date and time, e.g. 27/01/1997‬
‭-‬ ‭Array:‬ ‭An‬ ‭array‬ ‭is‬ ‭a‬ ‭series‬ ‭o f‬ ‭elements‬ ‭o f‬ ‭the‬ ‭same‬ ‭type‬ ‭placed‬ ‭in‬ ‭contiguous‬
‭memory‬‭locations‬‭that‬‭can‬‭be‬‭individually‬‭referenced‬‭by‬‭adding‬‭an‬‭index‬‭to‬‭a‬‭unique‬
‭identifier.‬

‭2. Network Databases‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭115‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ hese‬ ‭databases‬ ‭have‬ ‭links‬‭that‬
T
‭are‬ ‭used‬ ‭to‬ ‭express‬
‭relationships‬ ‭between‬ ‭different‬
‭data items.‬

‭ ata‬ ‭is‬ ‭maintained‬ ‭by‬ ‭a‬ ‭single‬


D
‭input.‬

‭ here‬ ‭is‬ ‭little‬ ‭duplication‬ ‭o f‬


T
‭data.‬

‭ here‬ ‭is‬ ‭no‬ ‭duplication‬ ‭o f‬


T
‭inputs.‬ ‭Linkages‬ ‭are‬ ‭more‬
‭flexible.‬

‭ any‬ ‭to‬ ‭many‬ ‭relationships‬ ‭to‬


M
‭records are limited‬

‭ .‬‭Hierarchical‬‭database:‬‭These‬‭are‬‭databases‬‭in‬‭which‬‭records‬‭are‬‭subordinates‬‭to‬
3
‭o ther‬ ‭records‬ ‭in‬ ‭a‬ ‭tree‬ ‭structure‬ ‭o f‬ ‭database.‬ ‭It‬ ‭promotes‬ ‭grandfather,‬ ‭father,‬ ‭and‬
‭son relationship of records as illustrated below..‬

‭ ach‬ ‭father‬ ‭file‬ ‭has‬ ‭o ne‬ ‭o r‬‭more‬


E
‭son files.‬

‭ ach‬ ‭son‬ ‭file‬ ‭has‬‭o nly‬‭o ne‬‭father‬


E
‭file.‬

‭ here‬‭are‬‭no‬‭cross‬‭linkages‬‭o f‬‭file‬
T
‭records.‬

I‭ t‬ ‭is‬ ‭difficult‬‭to‬‭access‬‭all‬‭the‬‭files‬
‭at one time.‬

‭ ‬ ‭lot‬ ‭o f‬ ‭duplication‬ ‭exists‬ ‭in‬ ‭this‬


A
‭type of database structure‬

‭Advantages of Databases‬
‭●‬ ‭Validation‬‭checks‬‭are‬‭made‬‭o n‬‭data‬‭during‬‭entry‬‭thereby‬‭reducing‬‭data‬‭entry‬
‭errors.‬
‭●‬ ‭Searching and retrieval of data is very fast.‬
‭●‬ ‭Less likelihood of data getting lost.‬
‭●‬ ‭Record structure can be easily modified if the need arises.‬
‭●‬ ‭Files can be linked together making file updating easier and faster.‬
‭●‬ ‭Avoids/reduces data redundancy.‬
‭●‬ ‭Data can be secured from unauthorised access by use of passwords.‬
‭●‬ ‭Users can share data if the database is networked.‬
‭●‬ ‭Duplication of records is eliminated.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭116‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭‬ A
● ‭ d hoc reports can be created easily.‬
‭●‬ ‭Sorting of records in any order is very fast‬

‭Disadvantages of databases‬
‭●‬ ‭If the computer breaks down, you may not be able to access the data.‬
‭●‬ ‭It is costly to initially setup the database.‬
‭●‬ ‭Computer‬ ‭data‬ ‭can‬ ‭be‬ ‭easily‬ ‭copied‬ ‭illegally‬ ‭and‬ ‭therefore‬ ‭should‬ ‭be‬
‭password protected.‬
‭●‬ ‭Takes time and costs to train users of the systems.‬
‭●‬ ‭Expensive to employ a database administrator who will manage the database‬

‭Advantages of computer based systems as compared to manual filing systems.‬


‭●‬ ‭Work can be done anywhere, even at offices in different countries.‬
‭●‬ ‭It is quicker to transfer files to other offices.‬
‭●‬ ‭Fewer staff is employed thereby saving expenses on wages.‬
‭●‬ ‭There are less chances of files getting lost.‬
‭●‬ ‭Less paperwork and storage requirements are needed.‬
‭●‬ ‭It is quicker to search needed records.‬
‭●‬ ‭It is quicker to sort records in any order using any field.‬
‭●‬ ‭It is quicker to cross reference files.‬
‭●‬ ‭It is quicker and easier to insert sections of files into reports‬

‭ lat‬‭file‬‭:‬‭this‬‭is‬‭a‬‭2-dimensional‬‭file,‬‭comprising‬‭o f‬‭rows‬‭and‬‭columns,‬‭that‬‭are‬‭used‬
F
‭to store data, e.g. in a spread sheet. A flat file has the following weaknesses:‬
‭-‬ ‭Data is not sharable among users‬
‭-‬ ‭Too much duplication of records‬
‭-‬ ‭Too much data redundancy‬
‭-‬ ‭Difficult to manage‬

‭ owever,‬‭the‬‭introduction‬‭o f‬‭the‬‭computer‬‭systems‬‭means‬‭that‬‭staff‬‭would‬‭need‬‭new‬
H
‭skills,‬‭can‬‭lead‬‭to‬‭unemployment,‬‭people‬‭are‬‭likely‬‭to‬‭work‬‭from‬‭home,‬‭could‬‭lead‬‭to‬
‭de-skilling and some health problems will suffice.‬

‭ ample Question‬
S
‭A‬ ‭database‬ ‭stores‬ ‭details‬ ‭about‬ ‭cars‬‭in‬‭a‬‭showroom:‬‭The‬‭database‬‭information‬‭can‬
‭be amended, deleted or new ones inserted due to:‬
‭Amended:‬ ‭information‬ ‭in‬ ‭the‬ ‭databases‬ ‭is‬ ‭incorrect.‬ ‭Price‬ ‭o f‬ ‭vehicle‬ ‭needs‬ ‭to‬ ‭be‬
‭changed (e.g. sales). Change of vehicle colour.‬
‭Deleted (record deleted):‬ ‭V‬‭ehicle is sold or Vehicle‬‭is scrapped‬
‭Inserted/‬ ‭added:‬ ‭new‬ ‭vehicle‬ ‭arrived.‬ ‭More‬ ‭information‬ ‭about‬ ‭current‬ ‭vehicle‬
‭becomes known.‬

‭ ODING DATA‬
C
‭Data‬ ‭to‬ ‭be‬ ‭entered‬ ‭into‬ ‭the‬ ‭computer‬ ‭can‬ ‭be‬ ‭coded‬ ‭/‬ ‭written‬ ‭in‬ ‭a‬ ‭short‬ ‭way,‬ ‭for‬
‭example:‬
‭In‬‭databases,‬‭a‬‭field‬‭for‬‭sex‬‭can‬‭be‬‭coded‬‭as‬‭follows:‬‭F‬‭for‬‭Female,‬‭M‬‭for‬‭Female.‬‭In‬
‭this‬‭case‬‭the‬‭user‬‭just‬‭enters‬‭F‬‭o r‬‭M‬‭and‬‭not‬‭the‬‭whole‬‭field‬‭as‬‭it‬‭is.‬‭The‬‭column‬‭for‬
‭colour can also be coded as B for Black, R for Red, Y for Yellow, etc.‬

‭Reasons form coding data:‬


‭●‬ ‭Codes are quicker to type in, both initially and subsequently.‬
‭●‬ ‭Reduces the size of files thereby saving disk storage space.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭117‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ ‭Increases the speed of searching and any process performed on data‬

‭Features of Codes‬
‭●‬ ‭Should be of the same length.‬
‭●‬ ‭Must be easy to use.‬
‭●‬ ‭Must not be too short in case you will run out of codes.‬
‭●‬ ‭Codes are often unique‬

‭PERIPHERAL DEVICES CONTROL‬


‭ ‬‭peripheral‬‭is‬‭any‬‭hardware‬‭connected‬‭to‬‭the‬‭central‬‭processing‬‭unit‬‭(processor),‬
A
‭e.g.‬ ‭mouse,‬ ‭printer,‬ ‭etc.‬ ‭Peripherals‬ ‭can‬ ‭be‬ ‭controlled‬‭in‬‭a‬‭number‬‭o f‬‭ways‬‭that‬‭will‬
‭provide continuous job processing sequence. These include:‬

‭ .‬‭Buffers:‬‭This‬‭is‬‭a‬‭temporary‬‭memory‬‭store‬‭for‬‭data‬‭awaiting‬‭processing‬‭o r‬‭o utput,‬


1
‭compensating‬ ‭speed‬ ‭at‬ ‭which‬‭devices‬‭o perate,‬‭for‬‭example‬‭printer‬‭buffer.‬‭Buffering‬
‭is‬‭appropriate‬‭where‬‭an‬‭o utput‬‭device‬‭processes‬‭data‬‭slower‬‭than‬‭the‬‭processor.‬‭For‬
‭example,‬‭the‬‭processor‬‭sends‬‭data‬‭to‬‭the‬‭printer,‬‭which‬‭prints‬‭much‬‭slower‬‭and‬‭the‬
‭processor‬ ‭does‬ ‭not‬ ‭need‬ ‭to‬ ‭wait‬ ‭for‬ ‭the‬ ‭printer‬ ‭to‬ ‭finish‬‭printing‬‭in‬‭o rder‬‭for‬‭it‬‭to‬
‭carry‬ ‭o ut‬ ‭the‬ ‭next‬ ‭task.‬ ‭The‬ ‭processor‬ ‭therefore‬ ‭saves‬ ‭the‬ ‭data,‬ ‭awaiting‬ ‭to‬ ‭be‬
‭printed,‬‭in‬‭a‬‭buffer‬‭where‬‭it‬‭will‬‭be‬‭retrieved‬‭by‬‭the‬‭printer.‬‭Buffering‬‭usually‬‭match‬
‭devices that work at different speeds, e.g. processor and disk.‬
‭Reasons for using printer buffers:‬
‭✔‬ ‭Stores data or information being sent to the printer temporarily.‬
‭✔‬ ‭Compensates for difference in speed of CPU and printer.‬
‭✔‬ ‭Allows CPU to carry out other tasks whilst printer is printing.‬

‭Benefits of increasing size of buffer in a printer:‬


‭✔‬ ‭Reduces the number of data transfers to the printer.‬
‭✔‬ ‭Ensures a more efficient use of the CPU.‬
‭✔‬ ‭Larger files can be sent to the printer without problems‬

‭ .‬ ‭Interrupts:‬ ‭An‬ ‭interrupts‬ ‭is‬ ‭a‬ ‭signal‬ ‭send‬ ‭to‬ ‭the‬ ‭processor‬ ‭by‬ ‭a‬ ‭peripheral‬ ‭for‬
2
‭attention‬‭to‬‭be‬‭turned‬‭to‬‭that‬‭peripheral,‬‭thereby‬‭causing‬‭a‬‭break‬‭in‬‭the‬‭execution‬‭o f‬
‭a program, e.g. printer out of paper. Examples/types of interrupts include:‬
‭✔‬ ‭Input / output interrupt‬‭e.g. disk full, printer out‬‭o f paper, etc.‬
‭✔‬ ‭Arithmetic and Logic Unit error‬‭.‬
‭✔‬ ‭Clock‬ ‭(happens‬ ‭normally‬ ‭in‬ ‭time‬ ‭sharing‬ ‭systems‬ ‭where‬ ‭the‬ ‭clock‬ ‭transfers‬
‭control from one computer to another.)‬
‭✔‬ ‭Program Interrupts:‬‭Arithmetic overflow, division‬‭by zero, etc‬
‭✔‬ ‭Hardware Failure‬‭: can be caused by power failure or‬‭memory‬
‭parity error‬
I‭ f‬ ‭two‬ ‭devices‬ ‭interrupt‬ ‭the‬ ‭processor‬ ‭at‬ ‭the‬ ‭same‬ ‭time,‬‭interrupt‬‭priorities‬‭will‬‭be‬
‭used.‬ ‭That‬ ‭is,‬ ‭an‬ ‭interrupt‬ ‭with‬ ‭a‬ ‭higher‬ ‭priority‬ ‭is‬ ‭handled‬ ‭first‬ ‭than‬ ‭that‬ ‭with‬ ‭a‬
‭lower priority.‬

‭ .‬‭Polling:‬‭A‬‭process‬‭whereby‬‭the‬‭processor‬‭interrogates‬‭peripherals‬‭to‬‭determine‬‭if‬
3
‭they‬‭are‬‭in‬‭a‬‭certain‬‭condition‬‭(or‬‭are‬‭present).‬‭Polling‬‭can‬‭take‬‭place‬‭during‬‭booting,‬
‭where‬‭the‬‭processor‬‭checks‬‭the‬‭connected‬‭devices‬‭like‬‭keyboard,‬‭mouse,‬‭hard‬‭disks,‬
‭etc.‬‭It‬‭also‬‭o ccurs‬‭in‬‭time-sharing‬‭systems‬‭where‬‭the‬‭processor‬‭checks‬‭if‬‭the‬‭terminal‬
‭has anything that needs processing.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭118‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ . Spooling (Simultaneous Peripheral Operating On-line)‬


4
‭A‬ ‭process‬ ‭o f‬ ‭transferring‬ ‭data‬ ‭from‬ ‭processor‬ ‭into‬ ‭temporary‬ ‭and‬ ‭faster‬ ‭access‬
‭storage‬‭awaiting‬‭release‬‭to‬‭a‬‭slow‬‭o utput‬‭device,‬‭for‬‭example‬‭to‬‭a‬‭printer.‬‭Jobs‬‭from‬
‭different users can be queued until the printer is ready to print.‬

‭ .‬ ‭Handshaking‬‭:‬ ‭It‬ ‭is‬ ‭the‬ ‭exchanging‬ ‭o f‬ ‭signals‬ ‭to‬ ‭establish‬ ‭communication‬ ‭link‬
5
‭between‬‭two‬‭devices/computers,‬‭for‬‭example‬‭modem‬‭and‬‭computer.‬‭It‬‭is‬‭a‬‭protocol‬
‭for‬ ‭establishment‬ ‭o f‬ ‭a‬ ‭link‬ ‭between‬ ‭two‬ ‭communicating‬ ‭devices.‬ ‭This‬ ‭controls‬
‭movement‬ ‭o f‬ ‭data‬ ‭between‬ ‭the‬ ‭computer‬‭devices,‬‭e.g.‬‭modems.‬‭The‬‭device‬‭engages‬
‭in‬ ‭something‬ ‭like‬ ‭a‬ ‭dialogue‬ ‭to‬ ‭acknowledge‬ ‭receipt‬ ‭o f‬ ‭data.‬ ‭Can‬ ‭also‬ ‭be‬ ‭called‬
‭Three-Way Handshake‬‭procedure‬

‭ .‬ ‭Scheduling:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭the‬‭processor‬‭decides‬‭the‬‭loading‬‭and‬‭execution‬‭o f‬


6
‭programs‬‭to‬‭provide‬‭continuous‬‭job‬‭processing‬‭sequence.‬‭Scheduling‬‭can‬‭do‬‭this‬‭by‬
‭giving‬ ‭time‬ ‭slices‬ ‭to‬ ‭each‬ ‭computer‬ ‭o r‬ ‭by‬ ‭queuing‬ ‭jobs.‬ ‭A‬ ‭number‬ ‭o f‬ ‭scheduling‬
‭algorithms‬ ‭can‬ ‭be‬ ‭used;‬ ‭e.g‬ ‭Shortest‬ ‭Job‬ ‭First,‬ ‭Shortest‬ ‭Remaining‬ ‭Time,‬ ‭Round‬
‭Robin, First Come First Served, etc. Scheduling generally ensures that:‬
‭●‬ ‭No resource is heavily under-utilised or over-utilised.‬
‭●‬ ‭The maximum number of interactive users get a reasonable response time.‬
‭●‬ ‭Making sure that no job is pushed to the back of a queue.‬
‭●‬ ‭Getting maximum number of jobs done in the minimum amount of time.‬

*‭ NB:‬ ‭Directory‬‭:‬ ‭-‬ ‭a‬ ‭folder‬ ‭used‬ ‭to‬ ‭store‬ ‭o ther‬ ‭folders‬ ‭and‬ ‭files‬ ‭in‬ ‭a‬ ‭hierarchical‬
‭structure. Directories are usually created in MS-DOS systems.‬

‭MALWARE‬
‭ alware‬ ‭(malicious‬ ‭software)‬ ‭is‬ ‭code‬ ‭o r‬ ‭software‬ ‭that‬ ‭is‬ ‭specifically‬ ‭designed‬ ‭to‬
M
‭damage,‬‭disrupt,‬‭steal‬‭o r‬‭inflict‬‭some‬‭o ther‬‭“bad”‬‭o r‬‭illegitimate‬‭action‬‭o n‬‭data,‬‭hosts,‬
‭o r networks.‬

‭Malware can be prevented using the following means:‬

-‭ ‬ ‭ se of audit trails to detect Trojan horses‬


U
‭-‬ ‭Backing up data to recover it after it has been destroyed or corrupted‬
‭-‬ ‭Use of antivirus programs‬
‭-‬ ‭Use of firewalls‬
‭-‬ ‭Use‬‭o f‬‭anti-spyware.‬‭Spyware‬‭is‬‭a‬‭program‬‭that‬‭detects‬‭programs‬‭that‬‭run‬‭o n‬
‭the‬ ‭background‬ ‭without‬ ‭knowledge‬ ‭o f‬ ‭user‬ ‭in‬ ‭o rder‬ ‭to‬ ‭steal‬ ‭data‬ ‭from‬ ‭the‬
‭user,‬ ‭e.g.‬ ‭stealing‬ ‭passwords,‬ ‭account‬ ‭details,‬‭etc.‬‭Spyware‬‭is‬‭mostly‬‭used‬‭for‬
‭the‬ ‭purposes‬ ‭o f‬ ‭tracking‬ ‭and‬ ‭storing‬‭Internet‬‭users'‬‭movements‬‭o n‬‭the‬‭Web‬
‭and serving up pop-up ads to Internet users. Spyware does not self replicate‬

‭Types Of Malware‬

‭Types of malware includes Worms, Trojan Horses and Viruses.‬

‭1. WORM‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭119‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ‬‭malicious‬‭program‬‭capable‬‭o f‬‭reproducing‬‭itself‬‭and‬‭spread‬‭from‬‭o ne‬‭computer‬‭to‬
A
‭the‬ ‭next‬ ‭over‬‭a‬‭network‬‭and‬‭consume‬‭computer‬‭resources‬‭like‬‭memory‬‭and‬‭CPU.‬‭It‬
‭does‬ ‭not‬ ‭delete‬ ‭files‬ ‭as‬ ‭viruses‬ ‭do.‬ ‭Worms‬ ‭travel‬ ‭unaided‬ ‭through‬ ‭the‬ ‭computer‬
‭network. It does not require a host file or human assistance for it to spread.‬

‭2. Trojan Horses‬

‭ hese‬‭are‬‭malicious‬‭programs‬‭that‬‭appears‬‭as‬‭programs‬‭useful‬‭to‬‭the‬‭user‬‭with‬‭the‬
T
‭intention‬ ‭o f‬ ‭soliciting‬ ‭information‬ ‭like‬ ‭user‬ ‭accounts‬ ‭and‬ ‭passwords‬ ‭o r‬ ‭damaging‬
‭computer‬ ‭system‬ ‭files‬ ‭and‬ ‭desktop‬ ‭settings.‬ ‭It‬ ‭can‬ ‭also‬ ‭allow‬ ‭o ther‬‭users‬‭to‬‭access‬
‭confidential information from your computer. They do not self-replicate.‬

‭ . COMPUTER VIRUSES‬
3
‭A‬ ‭computer‬ ‭virus‬ ‭is‬ ‭a‬ ‭malicious‬ ‭program‬ ‭which‬ ‭attaches‬ ‭itself‬ ‭to‬ ‭computer‬ ‭file,‬
‭replicates‬‭itself,‬‭damages,‬‭destroys‬‭o r‬‭corrupts‬‭files‬‭and‬‭memory‬‭o f‬‭the‬‭computer,‬‭for‬
‭example,‬ ‭boot‬ ‭sector‬ ‭viruses.‬ ‭Computer‬ ‭viruses‬ ‭spread‬ ‭with‬‭human‬‭action,‬‭e.g.‬‭run‬
‭an‬ ‭executable‬ ‭file.‬ ‭Viruses‬ ‭also‬ ‭need‬ ‭a‬ ‭host‬ ‭file‬ ‭to‬ ‭attach‬ ‭to‬ ‭it‬ ‭for‬ ‭it‬ ‭to‬ ‭spread.‬ ‭By‬
‭replication,‬‭it‬‭means‬‭that‬‭the‬‭virus‬‭can‬‭multiply‬‭itself‬‭(produces‬‭several‬‭similar‬‭copies‬
‭o f‬‭itself)‬‭when‬‭it‬‭enters‬‭the‬‭computer‬‭system.‬‭Examples‬‭o f‬‭known‬‭viruses‬‭are:‬‭Virus‬
‭Melissa, Jerusalem, Cascade, etc.‬

‭Signs and symptoms of virus attack on a computer:‬


‭●‬ ‭Reduced system performance (reduced speed of operation).‬
‭●‬ ‭The computer displays nasty messages on the screen.‬
‭●‬ ‭The computer displays a blank screen.‬
‭●‬ ‭The computer system produces wrong results of a process.‬
‭●‬ ‭Unexplained and frequent loss of data held in the computer.‬
‭●‬ ‭The‬ ‭hard‬ ‭disk‬ ‭becomes‬ ‭inaccessible‬ ‭(the‬‭user‬‭cannot‬‭access‬‭data‬‭held‬‭in‬‭the‬
‭computer).‬
‭●‬ ‭The computer fails to boot.‬

‭Effects of computer viruses:‬


‭●‬ ‭Memory of a computer will be used up, slows down computer.‬
‭●‬ ‭Alters system settings.‬
‭●‬ ‭Erases and corrupts files and data on the computer.‬
‭●‬ ‭Infects other computers on network.‬
‭●‬ ‭Leads to production loss.‬
‭●‬ ‭Leads to financial loss.‬
‭●‬ ‭The‬ ‭hard‬ ‭disk‬ ‭becomes‬ ‭inaccessible‬ ‭(the‬‭user‬‭cannot‬‭access‬‭data‬‭held‬‭in‬‭the‬
‭computer).‬
‭●‬ ‭The computer fails to boot.‬
‭●‬ ‭The computer system produces wrong results of a process.‬

‭Methods by which viruses spread from one computer to another‬


‭●‬ ‭By‬‭sharing‬‭diskettes,‬‭compact‬‭disks,‬‭hard‬‭disks,‬‭memory‬‭sticks,‬‭memory‬‭cards,‬
‭Video compact disks, Digital Versatile Disks, etc, with external users.‬
‭●‬ ‭Through networked computers, that is on a LAN, WAN or the internet.‬
‭●‬ ‭Can come as e-mail attachments, especially emails from unknown sources.‬
‭●‬ ‭Can come with downloads from bulletin boards‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭120‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭Methods of preventing virus attack on the computer‬


‭●‬ ‭Avoiding‬‭sharing‬‭external‬‭diskettes,‬‭compact‬‭disks,‬‭hard‬‭disks,‬‭memory‬‭sticks,‬
‭memory cards, Video compact disks, Digital Versatile Disk.‬
‭●‬ ‭Installing firewall‬
‭●‬ ‭Install the latest antivirus program on the computer and upgrade it frequently.‬
‭●‬ ‭Scan the computer with the latest antivirus frequently.‬
‭●‬ ‭Avoid‬ ‭software‬ ‭distributed‬ ‭as‬ ‭shareware‬ ‭(freeware)‬ ‭(‬‭software‬ ‭produced‬ ‭for‬
‭distribution‬ ‭free‬ ‭of‬ ‭charge‬ ‭and‬ ‭can‬ ‭be‬ ‭distributed‬ ‭to‬ ‭others‬ ‭free‬ ‭of‬ ‭charge,‬ ‭e.g.‬
‭computer games‬‭).‬
‭●‬ ‭Avoiding downloading software from bulletin boards.‬
‭●‬ ‭Use disk free workstations.‬
‭●‬ ‭Do‬‭not‬‭o pen‬‭email‬‭attachments‬‭from‬‭unknown‬‭sources‬‭o r‬‭download‬‭doubtful‬
‭software from the Internet.‬
‭●‬ ‭Do not use files that come from unknown sources.‬
‭●‬ ‭Buy original software and do not buy pirated software.‬
‭●‬ ‭Disable compact disk drives, diskette drives and USB ports of the computer.‬

‭ ntivirus programs‬
A
‭These‬ ‭are‬‭programs‬‭that‬‭detect‬‭computer‬‭viruses‬‭and‬‭reduce‬‭the‬‭risk‬‭o f‬‭computers‬
‭being‬ ‭attacked‬ ‭by‬ ‭viruses‬‭for‬‭example‬‭Norton‬‭Antivirus,‬‭MacAfee,‬‭Avira,‬‭Avast,‬‭AVG,‬
‭etc.‬

‭ ypes of Computer Viruses‬


T
‭1. Boot sector Viruses‬
‭These‬‭viruses‬‭affect‬‭the‬‭booting‬‭sector‬‭o n‬‭the‬‭hard‬‭disk‬‭so‬‭that‬‭the‬‭computer‬‭fails‬‭to‬
‭boot.‬

‭ . File sector Viruses‬


2
‭These viruses destroy files that are created by users on the computer.‬

‭3. Direct Action Virus‬


‭ his‬ ‭type‬ ‭o f‬ ‭virus‬ ‭o nly‬ ‭comes‬ ‭into‬ ‭action‬ ‭when‬ ‭the‬ ‭file‬ ‭containing‬ ‭the‬ ‭virus‬ ‭is‬
T
‭executed.‬

‭4. Macro Virus‬


‭ hese‬ ‭attack‬ ‭macros‬ ‭in‬ ‭applications,‬ ‭e.g.‬ ‭in‬ ‭databases‬ ‭and‬ ‭spreadsheets.‬ ‭The‬ ‭most‬
T
‭well-known‬ ‭macro‬ ‭virus‬ ‭is‬ ‭probably‬ ‭Melissa,‬ ‭a‬ ‭Word‬ ‭document‬ ‭supposedly‬
‭containing the passwords to pornographic websites.‬

‭5. Multipartite Virus‬


‭ ‬‭virus‬‭o f‬‭this‬‭type‬‭may‬‭spread‬‭in‬‭multiple‬‭ways,‬‭and‬‭it‬‭may‬‭take‬‭different‬‭actions‬‭o n‬
A
‭an‬‭infected‬‭computer‬‭depending‬‭o n‬‭variables,‬‭such‬‭as‬‭the‬‭o perating‬‭system‬‭installed‬
‭o r the existence of certain files.‬

‭6. Polymorphic Virus‬


‭ nother‬‭jack-of-all-trades,‬‭the‬‭Polymorphic‬‭virus‬‭actually‬‭mutates‬‭over‬‭time‬‭o r‬‭after‬
A
‭every‬‭execution,‬‭changing‬‭the‬‭code.‬‭Alternatively,‬‭o r‬‭in‬‭addition,‬‭a‬‭Polymorphic‬‭virus‬
‭may‬ ‭guard‬ ‭itself‬ ‭with‬ ‭an‬ ‭encryption‬ ‭algorithm‬ ‭that‬ ‭automatically‬ ‭alters‬ ‭itself‬ ‭when‬
‭certain conditions are met.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭121‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭7. Memory Resident Virus‬
‭ his‬ ‭broad‬ ‭virus‬ ‭definition‬ ‭applies‬ ‭to‬ ‭any‬ ‭virus‬ ‭that‬ ‭inserts‬ ‭itself‬ ‭into‬ ‭a‬ ‭system’s‬
T
‭memory.‬ ‭It‬ ‭then‬ ‭may‬ ‭take‬ ‭any‬ ‭number‬ ‭o f‬ ‭actions‬ ‭and‬ ‭run‬‭independently‬‭o f‬‭the‬‭file‬
‭that was originally infected.‬

‭DATA COMMUNICATION‬
‭ his‬ ‭deals‬ ‭with‬ ‭the‬ ‭means‬ ‭o f‬ ‭sending‬ ‭and‬ ‭receiving‬ ‭data‬ ‭o n‬‭networked‬‭computers.‬
T
‭Transmitted data can be in analogue or in digital form.‬
‭Digital Data‬‭: Data is in discrete value, that is,‬‭in ones and zeros.‬
‭Analogue‬‭Data‬‭:‬‭Data‬‭is‬‭in‬‭continuously‬‭varying‬‭form,‬‭in‬‭physical‬‭o r‬‭o riginal‬‭form‬‭e.g.‬
‭human voice.‬

‭ ynchronous and asynchronous Transmission‬


S
‭Synchronous‬‭Transmission‬‭:‬‭This‬‭is‬‭whereby‬‭data‬‭is‬‭sent‬‭in‬‭blocks‬‭(packets)‬‭at‬‭any‬
‭given time. This method is faster in transmitting data.‬
‭Asynchronous‬ ‭Transmission:‬ ‭This‬ ‭is‬ ‭whereby‬ ‭data‬ ‭is‬ ‭send‬‭character‬‭by‬‭character‬
‭over‬ ‭a‬ ‭transmission‬ ‭channel.‬ ‭This‬ ‭is‬ ‭much‬ ‭slower‬ ‭as‬ ‭compared‬ ‭to‬ ‭synchronous‬
‭transmission.‬

‭ ransmission Modes‬
T
‭Transmission modes include Simplex, Duplex (Full duplex) and Half Duplex‬

‭Simplex Transmission Mode‬ ‭Half Duplex Transmission Mode‬ ‭Duplex Transmission Mode‬
‭A‬ ‭B‬ ‭C‬

‭ implex‬‭Mode:‬‭This‬‭is‬‭a‬‭mode‬‭o f‬‭data‬‭transmission‬‭in‬‭which‬‭data‬‭travels‬‭o nly‬‭in‬‭o ne‬


S
‭direction‬‭(uni-directional).‬‭Thus‬‭o ne‬‭computer‬‭acts‬‭as‬‭the‬‭sender‬‭and‬‭the‬‭o ther‬‭as‬‭a‬
‭receiver forever. See diagram A, above.‬

‭ alf‬‭Duplex:‬‭This‬‭is‬‭a‬‭transmission‬‭mode‬‭in‬‭which‬‭data‬‭travels‬‭in‬‭both‬‭directions‬‭but‬
H
‭not‬‭simultaneously.‬‭It‬‭is‬‭bi-directional‬‭but‬‭not‬‭simultaneous.See‬‭diagram‬‭B‬‭above.‬‭The‬
‭receiver waits until the sender has finished sending data in order for him to respond.‬

‭ uplex/Full‬ ‭Duplex:‬ ‭This‬‭is‬‭a‬‭transmission‬‭mode‬‭in‬‭which‬‭transmission‬‭is‬‭possible‬


D
‭in‬ ‭both‬ ‭directions‬ ‭simultaneously.‬ ‭It‬ ‭is‬ ‭fully‬ ‭bi-directional.‬ ‭See‬ ‭diagram‬ ‭B‬ ‭above.‬
‭There is no need for one to wait until the channel is free from data.‬

‭ ransmission impairments‬
T
‭This‬ ‭refers‬ ‭to‬ ‭change‬ ‭in‬ ‭signal‬ ‭form‬ ‭as‬ ‭it‬ ‭propagates‬ ‭through‬ ‭the‬ ‭transmission‬
‭channel. Transmission impairments include:‬
‭Attenuation‬‭: The loss of signal power as it moves‬‭through the transmission channel.‬
‭Noise‬‭:‬ ‭Occurs‬ ‭when‬ ‭an‬ ‭unwanted‬ ‭signal‬ ‭from‬ ‭o ther‬ ‭sources‬ ‭than‬ ‭the‬ ‭transmitter‬
‭enters the transmission channel.‬

‭Multiplexing‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭122‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ his‬‭is‬‭a‬‭method‬‭o f‬‭allowing‬‭multiple‬‭signals‬‭to‬‭share‬‭the‬‭same‬‭channel,‬‭reducing‬‭too‬
T
‭much cabling, as shown below:‬
‭A‬ ‭multiplexer‬ ‭is‬ ‭used‬ ‭in‬
‭multiplexing.‬ ‭A‬ ‭multiplexer‬
‭is‬‭a‬‭device‬‭that‬‭joins‬‭two‬‭o r‬
‭more‬ ‭channels‬ ‭into‬ ‭o ne‬
‭channel‬ ‭while‬ ‭the‬
‭de-multiplexer‬ ‭is‬
‭responsible‬ ‭for‬ ‭splitting‬ ‭a‬
‭channel‬ ‭into‬ ‭a‬ ‭number‬ ‭o f‬
‭them‬‭for‬‭easy‬‭transmission‬
‭to the intended destination.‬
‭Bandwidth‬
‭Refers‬‭to‬‭the‬‭caring‬‭capacity‬‭o f‬‭a‬‭transmission‬‭channel‬‭(measured‬‭in‬‭bits‬‭per‬‭second:‬
‭bps).‬ ‭It‬ ‭determines‬ ‭the‬ ‭amount‬ ‭o f‬ ‭data‬ ‭a‬ ‭channel‬ ‭can‬ ‭transmit‬ ‭at‬‭a‬‭given‬‭period‬‭o f‬
‭time.‬

‭ ransmission Media‬
T
‭Refers‬ ‭to‬ ‭forms‬ ‭o f‬ ‭media‬ ‭through‬ ‭which‬ ‭data‬ ‭is‬ ‭transferred‬ ‭from‬ ‭o ne‬ ‭point‬ ‭to‬
‭another. These include:‬
‭1.‬‭Twisted‬‭Pair‬‭:‬‭These‬‭are‬‭cables‬‭with‬‭two‬‭copper‬‭wires‬‭o f‬‭about‬‭1‬‭millimetre‬‭thick.‬
‭The‬‭wires‬‭are‬‭twisted‬‭to‬‭avoid‬‭crosstalk.‬‭Twisted‬‭pair‬‭is‬‭very‬‭cheap‬‭to‬‭buy‬‭and‬‭o ffer‬
‭good performance over short distances.‬
‭Disadvantages‬ ‭of‬ ‭twisted‬ ‭pair:‬ ‭Twisted‬ ‭pair‬ ‭is‬ ‭very‬ ‭cheap‬ ‭to‬ ‭buy.‬ ‭Has‬ ‭big‬
‭attenuation. Has low bandwidth‬

‭ .‬‭Coaxial‬‭c able:‬‭It‬‭is‬‭a‬‭stiff‬‭copper‬‭wire‬‭surrounded‬‭by‬‭an‬‭insulating‬‭material.‬‭It‬‭has‬
2
‭less‬ ‭attenuation‬ ‭than‬ ‭twisted‬ ‭pair,‬ ‭has‬ ‭high‬ ‭bandwidth‬ ‭and‬ ‭has‬ ‭low‬ ‭error‬ ‭rates.‬
‭However, coaxial cable is expensive to buy and is stiff, making it difficult to handle.‬

‭ .‬ ‭Fibre‬ ‭optics:‬‭A‬‭media‬‭that‬‭uses‬‭light‬‭to‬‭transmit‬‭data.‬‭It‬‭has‬‭less‬‭attenuation,‬‭has‬
3
‭very‬ ‭high‬ ‭bandwidth‬ ‭and‬ ‭cannot‬ ‭corrode‬ ‭(not‬ ‭affected‬ ‭by‬ ‭corrosion),‬‭it‬‭is‬‭thin‬‭and‬
‭therefore‬ ‭has‬ ‭less‬ ‭weight.‬ ‭However,‬ ‭fibre‬ ‭o ptics‬ ‭is‬ ‭very‬ ‭expensive‬ ‭to‬ ‭buy‬ ‭and‬ ‭is‬
‭uni-directional (travels in one direction only)‬

‭ .‬ ‭Infra-red‬ ‭waves:‬ ‭Refers‬ ‭to‬ ‭data‬ ‭transmission‬ ‭in‬ ‭form‬‭o f‬‭waves‬‭as‬‭through‬‭some‬


4
‭remote‬‭controls‬‭o f‬‭televisions.‬‭It‬‭has‬‭enormous‬‭bandwidth.‬‭However,‬‭infrared‬‭waves‬
‭do‬ ‭not‬ ‭travel‬ ‭through‬ ‭o bstacles‬ ‭like‬ ‭buildings,‬ ‭they‬ ‭o nly‬ ‭work‬ ‭for‬ ‭very‬ ‭short‬
‭distances, affect eyes and consume a lot of power.‬

‭ .‬ ‭Satellite‬ ‭transmission:‬ ‭These‬ ‭include‬ ‭earth‬ ‭stations‬ ‭which‬ ‭communicate‬ ‭with‬


5
‭geostationary‬ ‭satellites‬ ‭(36‬ ‭000‬ ‭to‬ ‭80‬ ‭000‬ ‭km‬ ‭above‬ ‭the‬ ‭earth.‬ ‭These‬ ‭have‬ ‭high‬
‭bandwidth‬ ‭and‬ ‭support‬ ‭very‬ ‭long‬ ‭distance‬ ‭communication.‬ ‭However,‬ ‭they‬ ‭have‬‭big‬
‭attenuation and are slow in sending messages.‬

‭DATA SECURITY AND INTEGRITY‬


‭1. Data Security‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭123‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ata‬ ‭security‬ ‭refers‬ ‭to‬ ‭the‬ ‭means‬ ‭o f‬ ‭protecting‬‭data‬‭from‬‭unauthorised‬‭access‬‭and‬
D
‭from‬ ‭deliberate‬ ‭o r‬ ‭accidental‬ ‭loss.‬ ‭It‬ ‭includes‬ ‭the‬ ‭safety‬ ‭o f‬ ‭data‬ ‭from‬ ‭any‬ ‭form‬ ‭o f‬
‭hazard like floods, theft of the computer, fire, etc. Data security can be achieved by:‬

‭Physical Security measures against hardware and data loss.‬


‭●‬ ‭Locking the computer room.‬
‭●‬ ‭Employing security guards.‬
‭●‬ ‭Installing burglar bars on windows.‬
‭●‬ ‭Use of screen gates.‬
‭●‬ ‭Creating backups which will be stored at different locations (File Generations)‬
‭●‬ ‭Installing an electric fence around the computer room.‬
‭●‬ ‭Constructing a durawall around the computer room.‬
‭●‬ ‭Installing fire extinguishers inside the room.‬
‭●‬ ‭Building the computer room on higher grounds to avoid flooding.‬
‭●‬ ‭Installing a generator to avoid data loss through power cuts.‬
‭●‬ ‭Installing‬ ‭an‬ ‭Uninterruptible‬ ‭Power‬ ‭Supply‬ ‭(UPS)‬ ‭to‬ ‭prevent‬ ‭data‬ ‭loss‬
‭through power cuts:‬

‭ B‬‭:‬‭a‬‭UPS‬‭is‬‭a‬‭device‬‭connected‬‭between‬‭a‬‭computer‬‭and‬‭a‬‭power‬‭source‬‭to‬‭ensure‬
N
‭that‬‭electrical‬‭flow‬‭is‬‭not‬‭interrupted.‬‭UPS‬‭devices‬‭use‬‭batteries‬‭to‬‭keep‬‭the‬‭computer‬
‭running‬ ‭for‬ ‭a‬ ‭period‬ ‭o f‬ ‭time‬ ‭after‬ ‭a‬ ‭power‬ ‭failure.‬ ‭UPS‬ ‭devices‬ ‭usually‬ ‭provide‬
‭protection against power surges and blackouts as well.‬

‭Measures against unauthorised access to data held in the computer:‬


‭●‬ ‭Use‬ ‭o f‬ ‭data‬ ‭encryption‬ ‭methods‬ ‭before‬ ‭sending‬ ‭(‬‭data‬ ‭encryption‬ ‭is‬ ‭the‬
‭scrambling/coding‬ ‭of‬ ‭data‬ ‭before‬ ‭sending,‬ ‭for‬ ‭security‬ ‭reasons‬‭and‬‭can‬‭only‬‭be‬
‭understood once decoded‬‭).‬
‭●‬ ‭Use of user names and strong passwords.‬
‭●‬ ‭Use of firewalls.‬
‭●‬ ‭Biometrics: e.g. -use of iris, fingerprints and palm recognition systems.‬
‭●‬ ‭Log users for computer use.‬
‭●‬ ‭Use call back facility for incoming information.‬
‭●‬ ‭Check references of potential staff for employment purposes.‬
‭●‬ ‭Divide jobs between several people and then supervise the staff.‬
‭●‬ ‭Use physical locks like burglar bars, installing electric fences, etc.‬

‭ . Data integrity‬
2
‭This‬ ‭refers‬ ‭to‬ ‭the‬ ‭correctness‬ ‭and‬ ‭accurateness‬ ‭o f‬ ‭data‬ ‭held‬ ‭in‬ ‭the‬ ‭computer.‬ ‭The‬
‭issue‬ ‭o f‬‭data‬‭integrity‬‭and‬‭security‬‭lead‬‭to‬‭the‬‭introduction‬‭o f‬‭some‬‭data‬‭protection‬
‭laws which govern how organisations holding public data must operate.‬

‭ HE DATA PROTECTION ACT (1984)‬


T
‭This‬‭tries‬‭to‬‭regularise‬‭the‬‭use‬‭o f‬‭automatically‬‭processed‬‭individual‬‭information‬‭by‬
‭o rganisations. The Act outlines some of the following rules:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭124‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭‬ O
● ‭ rganisations using personal data must be registered.‬
‭●‬ ‭Data‬ ‭about‬ ‭individuals‬ ‭must‬ ‭be‬ ‭o btained‬ ‭fairly‬ ‭and‬ ‭lawfully‬ ‭for‬ ‭the‬‭purpose‬
‭collected for.‬
‭●‬ ‭Data‬‭must‬‭be‬‭used‬‭o nly‬‭for‬‭the‬‭specific‬‭purpose‬‭collected‬‭for‬‭and‬‭may‬‭o nly‬‭be‬
‭disclosed in accordance with such a purpose.‬
‭●‬ ‭Data‬‭collected‬‭must‬‭not‬‭be‬‭excessive‬‭for‬‭the‬‭purpose‬‭collected‬‭for‬‭but‬‭must‬‭be‬
‭adequate and relevant.‬
‭●‬ ‭Data‬ ‭collected‬ ‭must‬ ‭be‬ ‭accurate,‬ ‭up-to-date‬ ‭and‬ ‭kept‬ ‭no‬ ‭longer‬ ‭than‬
‭necessary.‬
‭●‬ ‭Data must be protected from unauthorised access or loss.‬
‭●‬ ‭Individuals‬ ‭with‬ ‭collected‬ ‭data‬ ‭have‬‭the‬‭right‬‭to‬‭view‬‭it‬‭and‬‭make‬‭alterations‬
‭where necessary.‬

I‭ mplications of Computer Application‬


‭The‬ ‭following‬ ‭are‬ ‭some‬ ‭o f‬ ‭the‬ ‭effects‬ ‭o f‬ ‭use‬ ‭o f‬ ‭computers‬ ‭(computerisation):‬
‭de-skilling,‬‭electronic‬‭scabbing,‬‭new‬‭production‬‭methods,‬‭new‬‭products‬‭and‬‭services,‬
‭health and safety, changes in working environment, unemployment, retraining‬
‭●‬ ‭Many people lose their jobs leading to high levels of unemployment.‬
‭●‬ ‭Huge‬‭profits‬‭are‬‭made‬‭by‬‭companies‬‭that‬‭engage‬‭in‬‭electronic‬‭commerce‬‭(‬‭the‬
‭advertising,‬ ‭buying‬ ‭and‬ ‭selling‬ ‭of‬ ‭goods‬ ‭and‬ ‭services‬ ‭on‬ ‭the‬ ‭internet‬‭)‬ ‭and‬
‭industrial automation.‬
‭●‬ ‭High productivity of high quality goods.‬
‭●‬ ‭Cheaper goods have been produced by companies.‬
‭●‬ ‭Cheaper,‬ ‭faster‬ ‭and‬ ‭more‬ ‭reliable‬ ‭means‬ ‭o f‬ ‭communication‬ ‭have‬ ‭been‬
‭realised.‬
‭●‬ ‭Creation of new jobs, e.g. computer programmers, computer technicians, etc.‬
‭●‬ ‭Companies‬ ‭lose‬ ‭a‬ ‭lot‬‭o f‬‭money‬‭by‬‭re-training‬‭o f‬‭their‬‭employees‬‭for‬‭them‬‭to‬
‭catch up of software updates, software changes and hardware changes.‬
‭●‬ ‭Retraining‬ ‭of‬ ‭workers‬ ‭without‬ ‭computer‬ ‭knowledge‬ ‭for‬ ‭them‬ ‭to‬ ‭keep‬ ‭up‬
‭with changing technology. A lot of money is invested in this exercise.‬
‭●‬ ‭De-skilling‬‭:‬ ‭-‬ ‭this‬ ‭is‬ ‭the‬ ‭replacement‬ ‭o f‬ ‭skilled‬ ‭and‬ ‭semi-skilled‬ ‭labour‬ ‭by‬
‭microprocessor‬ ‭controlled‬ ‭systems,‬ ‭with‬ ‭workers‬ ‭having‬ ‭to‬‭do‬‭jobs‬‭they‬‭did‬
‭not‬‭train‬‭for,‬‭e.g.‬‭in‬‭manufacturing,‬‭for‬‭example‬‭in‬‭car‬‭assemblies.‬‭Most‬‭o f‬‭the‬
‭skills‬‭which‬‭were‬‭highly‬‭valued‬‭are‬‭taken‬‭to‬‭be‬‭useless‬‭by‬‭the‬‭introduction‬‭o f‬
‭computers.‬ ‭The‬ ‭ability‬ ‭o f‬ ‭unions‬ ‭to‬ ‭maximise‬ ‭impact‬ ‭by‬ ‭selecting‬‭computing‬
‭staff for strike action, etc.‬
‭*NB:‬ ‭-‬ ‭Electronic‬ ‭scabbing‬‭:‬ ‭a‬ ‭process‬ ‭whereby‬ ‭managers‬ ‭switch‬ ‭word-processing‬
‭duties‬ ‭from‬ ‭striking‬ ‭workers‬ ‭in‬ ‭o ne‬ ‭country‬ ‭to‬ ‭none-striking‬ ‭workers‬ ‭in‬ ‭another‬
‭country.‬
‭●‬ ‭Improved working conditions and environments for employees.‬
‭●‬ ‭Misuse‬ ‭o f‬ ‭personal‬ ‭data‬ ‭held‬ ‭in‬ ‭public‬ ‭o ffices‬ ‭like‬ ‭police‬ ‭stations,‬ ‭registry‬
‭o ffices, etc.‬‭The data can be misused by:‬
‭Hackers‬‭may‬‭read‬‭the‬‭data‬‭and‬‭pass‬‭it‬‭o n.‬‭Hackers‬‭may‬‭delete‬‭the‬‭data.‬‭Hackers‬‭may‬
‭amend‬ ‭the‬ ‭data,‬ ‭plant‬ ‭viruses‬ ‭in‬ ‭the‬ ‭computer‬ ‭system,‬ ‭engage‬ ‭in‬ ‭industrial‬
‭espionage‬‭,‬‭sell‬‭company secrets and even‬‭blackmail‬‭.‬

‭Loss of data can be prevented by:‬


‭●‬ ‭Use of Usernames and strong Passwords.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭125‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ D ‭ o‬ ‭not‬ ‭connect‬ ‭the‬ ‭computers‬ ‭to‬ ‭a‬ ‭network.‬ ‭If‬ ‭connected‬ ‭to‬ ‭a‬ ‭network‬ ‭use‬
‭dedicated lines.‬
‭●‬ ‭Physical security‬‭- locks on computer room doors and‬‭employ guards.‬
‭●‬ ‭Install Firewall.‬
‭●‬ ‭Use Proxy server security.‬
‭●‬ ‭Data can be encrypted.‬
‭●‬ ‭Use iris and palm recognition systems.‬
‭●‬ ‭Use of swipe cards, finger print recognition systems.‬
‭●‬ ‭Use‬‭of‬‭audit‬‭trail‬‭:‬‭The‬‭process‬‭that‬‭tracks‬‭the‬‭activities‬‭o f‬‭users‬‭by‬‭recording‬
‭selected types of events in the security log of a server or a workstation.‬

‭ omputers can create health problems, for example:‬


C
‭- Lack of exercises by computer users.‬
‭1.‬ ‭Repetitive‬ ‭Strain‬ ‭Injury‬ ‭(RSI):‬ ‭-‬ ‭injury‬ ‭to‬ ‭muscles‬ ‭and‬ ‭tendons‬ ‭caused‬ ‭by‬
‭continuous‬ ‭repetitive‬ ‭use‬ ‭o f‬ ‭particular‬ ‭muscles,‬ ‭especially‬ ‭by‬ ‭using‬ ‭a‬ ‭keyboard,‬ ‭o r‬
‭working‬ ‭o n‬ ‭an‬ ‭assembly‬ ‭line.‬ ‭Employees‬ ‭are‬ ‭advised‬ ‭to‬ ‭have‬ ‭frequent‬ ‭breaks‬ ‭to‬
‭avoid RSI. They can also type with their fingers straight and flat on the keyboard.‬

‭ .‬ ‭Eye‬ ‭problems‬‭:‬ ‭-‬ ‭itchiness‬ ‭o f‬ ‭eyes‬ ‭caused‬ ‭by‬ ‭light‬‭reflected‬‭by‬‭computer‬‭screens.‬


2
‭This can be solved by:‬
‭Wearing‬ ‭spectacles‬ ‭(glasses).‬ ‭Use‬ ‭o f‬ ‭antiglare‬ ‭screens:‬ ‭these‬ ‭reduce‬ ‭the‬ ‭amount‬‭o f‬
‭light‬ ‭reflected‬ ‭by‬ ‭the‬ ‭screen.‬ ‭Adjusting‬ ‭screen‬ ‭settings‬ ‭so‬ ‭that‬ ‭it‬ ‭becomes‬ ‭darker.‬
‭Very bright colours are dangerous for eyes.‬

‭ .‬‭Backbone‬‭problems‬‭:‬‭sitting‬‭o n‬‭the‬‭computer‬‭for‬‭a‬‭long‬‭period‬‭can‬‭cause‬‭this.‬‭This‬
3
‭can be solved by:‬
‭Using‬‭a‬‭chair‬‭that‬‭is‬‭adjustable‬‭to‬‭fit‬‭the‬‭height‬‭suitable‬‭for‬‭each‬‭employee.‬‭Sitting‬‭up‬
‭while using the computer.‬

‭4. Increase in the amount of litter due to dumping of used and old computers‬

‭ .‬‭Children‬‭are‬‭being‬‭exposed‬‭to‬‭pornography,‬‭hate‬‭literature,‬‭racism‬‭and‬‭dangerous‬
5
‭experiments‬‭like‬‭those‬‭for‬‭manufacturing‬‭bombs‬‭o n‬‭the‬‭internet.‬‭This‬‭c an‬‭be‬‭solved‬
‭by‬‭:‬
‭Installing‬ ‭software‬ ‭that‬ ‭prevents‬ ‭children‬ ‭from‬ ‭accessing‬ ‭restricted‬ ‭sites‬ ‭o n‬ ‭the‬
‭internet‬ ‭like‬ ‭Net-Nanny,‬ ‭Surfwatch,‬ ‭Cybersitter,‬ ‭etc.‬ ‭This‬ ‭software‬ ‭blocks‬
‭inappropriate‬ ‭sites‬ ‭and‬ ‭subject‬ ‭matter.‬ ‭Teachers‬ ‭and‬ ‭parents‬ ‭need‬ ‭to‬ ‭closely‬
‭supervise‬ ‭students‬ ‭during‬ ‭internet‬ ‭access.‬ ‭Firewalls‬ ‭can‬ ‭also‬ ‭be‬ ‭installed‬ ‭as‬ ‭a‬
‭security measure.‬

‭Protecting of data against accidental loss‬


‭●‬ ‭Periodically backing up data that will be stored in a secure, fireproof safe.‬
‭●‬ ‭Training users to follow proper updating procedures.‬
‭●‬ ‭Avoid bringing in outside disks which transmit viruses.‬
‭●‬ ‭Load recent antivirus programs and update them frequently.‬

‭WHAT IS A COMPUTER?‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭126‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
I‭ t‬ ‭is‬ ‭an‬ ‭electronic‬ ‭device‬ ‭that‬ ‭works‬ ‭under‬ ‭the‬ ‭control‬ ‭o f‬ ‭stored‬ ‭programs‬ ‭to‬
‭automatically‬‭accept,‬‭store‬‭and‬‭process‬‭data‬‭into‬‭information.‬‭Therefore,‬‭a‬‭computer‬
‭has the following characteristics:‬
‭●‬ ‭It is electronic‬‭:- can only work when there is electricity‬
‭●‬ ‭It is a device:‬‭a machine‬
‭●‬ ‭Is‬ ‭controlled‬ ‭by‬ ‭programs:‬ ‭Works‬ ‭according‬ ‭to‬ ‭instructions,‬ ‭written‬ ‭in‬
‭computer language, given by the user for it to perform a specific tasks.‬
‭●‬ ‭Is‬ ‭automatic‬ ‭in‬ ‭operation‬‭:‬ ‭Can‬ ‭work‬ ‭with‬ ‭minimum‬ ‭o r‬ ‭no‬ ‭human‬
‭intervention.‬
‭●‬ ‭Can‬ ‭accept‬ ‭data‬‭:‬ ‭data‬ ‭can‬ ‭be‬ ‭entered‬ ‭into‬ ‭the‬ ‭computer‬ ‭through‬ ‭various‬
‭means and the computer accepts it.‬
‭●‬ ‭Can‬ ‭store‬ ‭data‬ ‭and‬ ‭programs‬‭:‬ ‭Data‬ ‭and‬ ‭programs‬ ‭entered‬ ‭into‬ ‭the‬
‭computer can be stored for future use.‬
‭●‬ ‭Can process data into information‬

‭ ata and Information‬


D
‭1.‬‭Data:‬‭refers‬‭to‬‭raw‬‭facts‬‭and‬‭figures‬‭o f‬‭an‬‭activity.‬‭It‬‭can‬‭just‬‭be‬‭a‬‭list‬‭o f‬‭numbers,‬
‭names‬ ‭o r‬ ‭a‬ ‭combination‬ ‭o f‬ ‭these.‬ ‭Data‬ ‭is‬ ‭meaningless‬ ‭and‬ ‭needs‬ ‭to‬ ‭be‬ ‭processed.‬
‭Data cannot be used for decision making purposes as it is meaningless.‬

‭ .‬‭Information:‬‭It‬‭is‬‭data‬‭that‬‭has‬‭been‬‭converted‬‭into‬‭meaningful‬‭form.‬‭In‬‭general‬‭it‬
2
‭is‬ ‭processed‬ ‭data.‬ ‭Information‬ ‭can‬ ‭be‬ ‭understood‬ ‭and‬ ‭therefore‬ ‭can‬ ‭be‬ ‭used‬ ‭for‬
‭decision‬ ‭making‬ ‭purposes.‬ ‭Information‬ ‭is‬ ‭meaningful.‬ ‭To‬ ‭get‬ ‭relevant‬ ‭information,‬
‭data‬‭entered‬‭into‬‭the‬‭computer‬‭must‬‭be‬‭relevant,‬‭accurate‬‭and‬‭up-to-date‬‭.‬‭If‬‭data‬
‭entered‬ ‭into‬ ‭the‬ ‭computer‬ ‭is‬ ‭wrong‬ ‭(Garbage‬ ‭In)‬ ‭the‬ ‭results‬ ‭will‬ ‭also‬ ‭be‬ ‭wrong‬
‭(Garbage‬‭Out),‬‭and‬‭is‬‭generally‬‭referred‬‭to‬‭as‬‭Garbage-In‬‭Garbage-Out‬‭(GIGO‬‭).‬‭It‬‭is‬
‭a‬ ‭rule‬ ‭stating‬ ‭that‬ ‭the‬ ‭quality‬ ‭o f‬ ‭the‬‭o utput‬‭is‬‭a‬‭function‬‭o f‬‭the‬‭quality‬‭o f‬‭the‬‭input;‬
‭put‬ ‭garbage‬ ‭in‬ ‭and‬ ‭you‬ ‭get‬ ‭garbage‬ ‭o ut.‬ ‭Therefore‬ ‭the‬ ‭accuracy‬ ‭o f‬ ‭the‬ ‭results‬
‭produced‬‭by‬‭the‬‭computer‬‭depends‬‭o n‬‭how‬‭accurate‬‭the‬‭user‬‭enters‬‭data,‬‭functions,‬
‭formulae and codes program procedures.‬

‭The Data Processing Cycle‬

‭ omputer Generations‬
C
‭Refers‬‭to‬‭stages‬‭through‬‭which‬‭computers‬‭developed‬‭from‬‭the‬‭1940s‬‭to‬‭date.‬‭These‬
‭are as follows:‬
‭1.‬ ‭First‬‭Generation‬‭Computers‬‭(1945‬‭-1955):‬‭These‬‭are‬‭the‬‭earliest‬‭computers‬
‭that‬ ‭used‬ ‭valves‬ ‭in‬ ‭controlling‬ ‭machines,‬ ‭e.g.‬ ‭EDVAC,‬ ‭ACE‬ ‭and‬ ‭UNIVAC‬
‭machines.‬ ‭These‬ ‭were‬ ‭very‬ ‭large‬ ‭computers,‬ ‭fitting‬ ‭about‬ ‭the‬ ‭size‬ ‭o f‬ ‭an‬
‭average‬ ‭room.‬ ‭They‬ ‭were‬ ‭programmed‬ ‭in‬‭a‬‭language‬‭understandable‬‭by‬‭the‬
‭machine.‬‭Such‬‭computers‬‭used‬‭a‬‭lot‬‭o f‬‭electricity‬‭and‬‭were‬‭very‬‭expensive‬‭to‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭127‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭purchase.‬ ‭Only‬ ‭very‬ ‭large‬ ‭o rganisation‬ ‭could‬ ‭afford‬ ‭these‬ ‭computers.‬ ‭Such‬
c‭ omputers were‬‭huge‬‭,‬‭slow‬‭,‬‭expensive‬‭and‬‭often undependable‬‭. ‬

‭ .‬ ‭Second‬ ‭Generation‬ ‭Computers‬ ‭(1955‬ ‭-1965):‬ ‭These‬ ‭are‬ ‭computers‬ ‭that‬ ‭used‬
2
‭transistors‬‭instead‬‭o f‬‭valves.‬‭They‬‭were‬‭faster,‬‭had‬‭reduced‬‭size,‬‭were‬‭more‬‭reliable‬
‭and less expensive.‬

‭ econd‬ ‭generation‬ ‭computers‬ ‭were‬‭:‬


S
‭faster,‬ ‭more‬ ‭reliable,‬ ‭smaller,‬ ‭much‬
‭cheaper‬ ‭to‬ ‭build,‬ ‭gave‬ ‭o ff‬ ‭virtually‬ ‭no‬
‭heat, conduct electricity faster‬

‭Transistor‬

‭ .‬ ‭Third‬ ‭Generation‬‭Computers‬‭(1965‬‭–‬‭1980):‬‭These‬‭used‬‭integrated‬‭circuits‬‭e.g.‬
3
‭the‬ ‭IBM‬ ‭(International‬ ‭Business‬ ‭Machines)‬ ‭computers.‬ ‭The‬ ‭integrated‬ ‭circuit,‬ ‭also‬
‭referred‬‭to‬‭as‬‭semiconductor‬‭chip,‬‭packs‬‭a‬‭huge‬‭number‬‭o f‬‭transistors‬‭o nto‬‭a‬‭single‬
‭wafer‬ ‭o f‬ ‭silicon.‬ ‭These‬ ‭computers‬ ‭have‬ ‭increased‬ ‭the‬ ‭power‬‭,‬ ‭lowered‬ ‭cost‬‭,‬ ‭carry‬‭out‬
‭instructions in billionths of a second‬‭, and‬‭smaller‬‭.‬

‭ .‬ ‭Fourth‬ ‭Generation‬‭Computers‬‭(1980-1990):‬‭The‬‭Fourth‬‭Generation‬‭Computers‬
4
‭that‬ ‭used‬ ‭microprocessors‬ ‭and‬ ‭concentrated‬ ‭o n‬ ‭miniaturisation‬ ‭o f‬ ‭high‬‭processing‬
‭components.‬‭Fourth‬‭Generation‬‭Computers‬‭are‬‭grouped‬‭into‬‭mainframe,‬‭mini,‬‭micro‬
‭and super computers, depending on their sizes, capabilities and memory size.‬

‭Microprocessor‬

‭ .‬ ‭Fifth‬ ‭Generation‬ ‭Computers‬ ‭(1990‬ ‭to‬ ‭date‬ ‭and‬ ‭beyond):‬ ‭These‬ ‭use‬ ‭natural‬
5
‭language‬ ‭and‬ ‭can‬ ‭flexibly‬ ‭interact‬ ‭with‬ ‭the‬ ‭human‬ ‭being.‬ ‭Such‬ ‭systems‬ ‭are‬‭used‬‭in‬
‭medical‬ ‭diagnosis,‬‭mineral‬‭prospecting‬‭and‬‭in‬‭geological‬‭researches.‬‭Such‬‭computer‬
‭systems are capable of human intelligence and are commonly called expert systems.‬

‭ ypes of Computers‬
T
‭The‬ ‭types‬ ‭o f‬ ‭computers‬ ‭are:‬ ‭Micro-computers,‬ ‭mainframe‬ ‭computer,‬ ‭super‬
‭computer & mini-computer.‬‭They can also be‬‭digital‬‭o r‬‭analogue‬‭computers‬‭.‬
‭1.‬ ‭Micro‬‭Computers:‬‭These‬‭are‬‭computers‬‭with‬‭a‬‭microprocessor‬‭inside‬‭them‬‭and‬
‭o ccupy‬ ‭a‬ ‭small‬ ‭physical‬ ‭space.‬ ‭They‬ ‭are‬ ‭cheap,‬ ‭small,‬ ‭relatively‬ ‭slow‬ ‭and‬ ‭have‬
‭limited memory, often single user, easy to use and have low computing power.‬
‭Microcomputers‬‭include the following:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭128‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭a.‬ D ‭ esktop‬ ‭Computers:‬ ‭These‬ ‭are‬ ‭computers‬ ‭with‬ ‭a‬ ‭separate‬ ‭CPU‬ ‭and‬ ‭monitor‬
‭and‬‭fit‬‭o n‬‭a‬‭desk‬‭during‬‭usage.‬‭They‬‭are‬‭relatively‬‭cheap.‬‭They‬‭are‬‭easy‬‭to‬‭add‬
‭expansion‬‭cards‬‭o n‬‭them.‬‭However,‬‭they‬‭take‬‭up‬‭large‬‭desk‬‭space.‬‭They‬‭are‬‭not‬
‭portable‬
‭b.‬ ‭Personal‬‭Computers‬‭(PC):‬‭-‬‭These‬‭are‬‭microcomputers‬‭made‬‭for‬‭use‬‭at‬‭home‬
‭for‬ ‭general‬ ‭purpose,‬ ‭and‬ ‭includes‬ ‭desktop‬ ‭computers.‬ ‭They‬ ‭are‬ ‭cheap,‬ ‭more‬
‭powerful and has good storage capacity disks.‬
‭Advantages of desktop/PCs‬
‭-‬ ‭Low cost‬
‭-‬ ‭Spare parts tend to be standardised‬
‭-‬ ‭Faster processors, 2.0 GHz‬
‭-‬ ‭Large casing allows good dissipation of any heat build-up‬
‭Disadvantages‬
‭-‬ ‭Not portable‬
‭-‬ ‭Take large desk space‬
‭-‬ ‭All devices need to be wired together which might be too complex‬

‭c.‬ P
‭ almtops:‬ ‭These‬ ‭are‬ ‭portable‬ ‭microcomputers‬ ‭that‬ ‭can‬ ‭fit‬ ‭in‬ ‭the‬ ‭palm‬ ‭and‬
‭pocket and are used as diaries and for other small business applications.‬
‭They‬‭are‬‭Handheld‬‭Computers‬‭that‬‭are‬‭small‬‭enough‬
‭to‬ ‭be‬ ‭carried‬ ‭in‬ ‭a‬ ‭pocket‬ ‭and‬ ‭include‬ ‭Personal‬
‭Digital‬ ‭Assistants‬ ‭(PDAs)‬ ‭and‬ ‭Cell‬ ‭phones‬‭.‬ ‭These‬
‭are‬ ‭mostly‬ ‭used‬ ‭as‬ ‭diaries,‬ ‭word‬ ‭processing,‬ ‭faxing,‬
‭internet‬ ‭browsing,‬ ‭calculator,‬ ‭contacts,‬ ‭etc.‬‭PDAs‬‭and‬
‭all‬ ‭palmtops‬ ‭are‬ ‭portable.‬ ‭However,‬ ‭they‬ ‭are‬
‭expensive‬‭and‬‭have‬‭limited‬‭expansion.‬‭They‬‭are‬‭even‬
‭slow to input data using them.‬

‭d.‬ L
‭ aptops‬ ‭(Notebook‬ ‭computers):‬ ‭-‬ ‭These‬ ‭are‬ ‭portable‬‭computers‬‭that‬‭use‬‭an‬
‭internal‬ ‭battery‬ ‭for‬ ‭power‬ ‭and‬ ‭can‬ ‭be‬ ‭placed‬ ‭o n‬ ‭laps‬ ‭during‬ ‭usage.‬ ‭The‬
‭keyboard,‬ ‭pointing‬‭device,‬‭monitor‬‭and‬‭processor‬‭are‬‭all‬‭designed‬‭as‬‭o ne‬‭unit.‬
‭They‬‭have‬‭LCD‬‭(Liquid‬‭Crystal‬‭Display)‬‭screens‬‭which‬‭are‬‭not‬‭as‬‭bright‬‭as‬‭most‬
‭Monitors.‬
‭Laptops‬‭are‬‭small‬‭like‬‭a‬‭briefcase‬‭and‬‭are‬
‭portable‬‭and‬‭can‬‭be‬‭used‬‭in‬‭areas‬‭where‬
‭there‬ ‭is‬ ‭no‬ ‭electricity.‬ ‭They‬ ‭have‬ ‭light‬
‭weight‬ ‭and‬ ‭are‬ ‭battery‬ ‭powered.‬ ‭They‬
‭consume‬ ‭less‬ ‭electricity.‬ ‭The‬ ‭processor‬
‭does‬ ‭produce‬ ‭too‬ ‭much‬ ‭heat.‬ ‭They‬ ‭also‬
‭do‬‭not‬‭have‬‭trailing‬‭wires‬‭as‬‭everything‬‭is‬
‭in‬ ‭o ne‬ ‭unit.‬ ‭They‬ ‭can‬‭take‬‭full‬‭advantage‬
‭o f WIFI.‬
‭Laptop computer‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭129‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ owever,‬ ‭laptops‬ ‭can‬ ‭easily‬ ‭get‬ ‭stolen,‬
H
‭they‬ ‭need‬ ‭recharging‬ ‭from‬ ‭time‬ ‭to‬ ‭time,‬
‭some‬ ‭find‬ ‭it‬ ‭difficult‬ ‭to‬ ‭use‬ ‭the‬ ‭laptop‬
‭keyboard‬‭and‬‭inbuilt‬‭mouse,‬‭and‬‭they‬‭are‬
‭even‬‭expensive‬‭to‬‭buy‬‭and‬‭to‬‭repair.‬‭They‬
‭also‬ ‭have‬ ‭limited‬ ‭expandability‬ ‭and‬
‭docking‬ ‭stations.‬ ‭Laptops‬ ‭are‬ ‭more‬
‭subject‬ ‭to‬ ‭wear‬ ‭and‬ ‭tear‬ ‭due‬ ‭to‬
‭portability. They can also be stolen easily.‬
‭e.‬ ‭Netbook‬‭Computer:‬‭These‬‭are‬‭smaller‬‭versions‬‭o f‬‭laptops,‬‭they‬‭can‬‭almost‬‭fit‬
‭in‬ ‭a‬ ‭hand‬ ‭and‬ ‭do‬ ‭not‬ ‭have‬ ‭o ptical‬ ‭devices‬ ‭(CD/DVD‬ ‭drive)‬ ‭o n‬ ‭them.‬ ‭Their‬
‭benefits‬ ‭and‬ ‭problems‬ ‭are‬ ‭similar‬ ‭to‬ ‭those‬ ‭o f‬ ‭laptops.‬ ‭However,‬ ‭they‬ ‭are‬
‭cheaper and they have a weakness that they do not have optical devices.‬

‭f.‬ T‭ ablet‬ ‭Personal‬ ‭Computers‬‭:‬ ‭Type‬ ‭o f‬ ‭notebook‬ ‭that‬ ‭accepts‬ ‭input‬ ‭from‬ ‭an‬
‭electronic pen‬

‭Tablet PCs (a) Slate model‬ ‭(b) Convertible model‬

‭For schools and school children, laptops have the following advantages:‬
‭-‬ ‭Users can save data in their own storage area wherever they are.‬
‭-‬ ‭Users can get any networked software wherever they are.‬
‭-‬ ‭School needs fewer printers.‬
‭-‬ ‭Users do not need to keep using the same machine.‬
‭-‬ ‭Users can access school intranet from anywhere.‬
‭-‬ ‭Users can access Internet from anywhere.‬
‭-‬ ‭Users do not need to carry CD ROMs.‬
‭-‬ ‭It is easier to communicate with.‬
‭-‬ ‭Can email work to teachers even from home.‬
‭-‬ ‭Staff can monitor students easily.‬
‭-‬ ‭Students and teachers can share files and notes easily.‬

‭However, the following problems may arise:‬


‭-‬ ‭Work can be hacked into more easily.‬
‭-‬ ‭If no convenient network point, users cannot work.‬
‭-‬ ‭It is expensive to buy many network cards.‬
‭-‬ ‭If server goes down users cannot work.‬
‭-‬ ‭Students can use Internet inappropriately, for instance watching pornography.‬
‭-‬ ‭Viruses can be downloaded easily.‬
‭-‬ ‭Costs of updating or replacing server are high.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭130‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
*‭ ‬‭NB‬‭:‬‭-‬‭Microprocessor‬‭:‬‭A‬‭small‬‭execution‬‭chip‬‭found‬‭o n‬‭microcomputers‬‭and‬‭o ther‬
‭devices‬ ‭used‬ ‭to‬ ‭process‬ ‭data‬ ‭and‬ ‭to‬ ‭control‬ ‭o ther‬ ‭devices.‬ ‭It‬ ‭contains‬ ‭registers,‬
‭Control unit and the Arithmetic and Logic Unit.‬
‭-‬‭Microcomputers‬‭perform‬‭general‬‭purposes‬‭like‬‭word-processing,‬‭processing‬‭small‬
‭amounts‬ ‭o f‬ ‭data,‬ ‭playing‬ ‭music,‬ ‭etc.‬ ‭However,‬ ‭these‬ ‭days,‬ ‭microcomputers‬‭can‬‭also‬
‭be used in large organisations because of improved efficiency in their usage.‬

‭ .‬ ‭Mini-Computers:‬ ‭these‬ ‭are‬ ‭in-between‬ ‭mainframe‬ ‭computers‬ ‭and‬


2
‭microcomputers‬ ‭computers.‬ ‭They‬ ‭are‬ ‭bigger‬ ‭than‬ ‭micro-computers.‬ ‭They‬ ‭allow‬
‭more‬ ‭than‬ ‭o ne‬ ‭user.‬ ‭Have‬ ‭more‬ ‭computing‬ ‭power.‬ ‭They‬ ‭are‬ ‭suitable‬ ‭for‬ ‭large‬
‭business‬ ‭o rganisations‬ ‭like‬ ‭in‬ ‭banks‬ ‭where‬ ‭they‬ ‭process‬ ‭client‬ ‭accounts.‬ ‭They‬ ‭are‬
‭however‬‭less‬‭powerful‬‭than‬‭mainframes.‬‭Allows‬‭several‬‭terminals‬‭with‬‭multi-tasking,‬
‭few‬ ‭printers‬ ‭and‬ ‭larger‬ ‭storage‬ ‭location.‬ ‭They‬ ‭include‬ ‭mid-range‬ ‭server‬ ‭and‬
‭workstations and process large amounts of data.‬

‭ .‬‭Mainframe‬‭Computers:‬‭these‬‭are‬‭large‬‭and‬‭powerful‬‭computer‬‭systems.‬‭They‬‭are‬
3
‭mostly‬ ‭used‬ ‭in‬ ‭large‬ ‭o rganisations‬ ‭like‬ ‭banks‬ ‭and‬ ‭where‬ ‭bulk‬ ‭data‬ ‭processing‬ ‭is‬
‭needed‬ ‭such‬ ‭as‬ ‭census,‬ ‭industry/consumer‬ ‭statistics,‬ ‭and‬ ‭financial‬ ‭transaction‬
‭processing. They have the following features:‬
‭-‬ ‭they can have several CPUs,‬
‭-‬ ‭have very fast processor speed‬
‭-‬ ‭can support multiple operating systems‬
‭-‬ ‭have huge storage capacity‬
‭-‬ ‭have huge internal memory‬
‭-‬ ‭can operate using time sharing or batch processing‬
‭-‬ ‭Allows several users and can accommodate multiple processors.‬
‭-‬ ‭They are very large and expensive.‬

‭ hese‬ ‭are‬ ‭very‬ ‭big‬ ‭in‬


T
‭size‬ ‭and‬ ‭extremely‬ ‭fast.‬
‭They‬ ‭have‬ ‭very‬ ‭large‬
‭memory‬ ‭capacity‬ ‭and‬
‭can‬ ‭be‬ ‭used‬ ‭in‬
‭educational designs.‬

‭ owever,‬ ‭because‬ ‭o f‬
H
‭their‬ ‭size,‬ ‭they‬ ‭are‬ ‭not‬
‭Mainframe computers‬ ‭portable‬ ‭and‬ ‭are‬
‭permanently‬ ‭housed‬ ‭in‬
‭a‬ ‭large‬ ‭room.‬ ‭They‬ ‭are‬
‭also‬ ‭expensive‬ ‭to‬
‭maintain and to operate.‬

‭ .‬ ‭Super‬ ‭Computers:‬‭These‬‭are‬‭very‬‭powerful‬‭computers‬‭that‬‭are‬‭used‬‭to‬‭perform‬
4
‭detailed‬ ‭calculations‬ ‭and‬ ‭for‬ ‭design‬ ‭purposes,‬ ‭for‬ ‭example,‬ ‭modelling‬ ‭o f‬ ‭aircraft‬
‭wings, testing bombs, etc. They are the fastest and most expensive computers‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭131‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

S‭ upercompute‬‭r‬
‭*NB:-‬ ‭The‬ ‭classification‬ ‭o f‬ ‭computers‬ ‭as‬ ‭micro,‬ ‭mini,‬ ‭mainframes‬ ‭and‬ ‭super‬
‭computers‬ ‭have‬ ‭become‬ ‭blared‬ ‭due‬ ‭to‬ ‭recent‬ ‭technological‬ ‭advancements‬ ‭since‬ ‭a‬
‭microcomputer‬ ‭can‬ ‭now‬ ‭perform‬ ‭all‬ ‭functions‬ ‭that‬ ‭were‬ ‭believed‬ ‭to‬ ‭be‬ ‭for‬
‭mainframes.‬

‭ lassification‬ ‭o f‬‭computers‬‭can‬‭also‬‭be‬‭made‬‭relating‬‭to‬‭the‬‭use‬‭o f‬‭the‬‭computer,‬‭as‬


C
‭follows:‬
‭(a)‬‭General‬‭Purpose‬‭Computers:‬‭-‬‭these‬‭are‬‭computers‬‭that‬‭can‬‭be‬‭used‬‭to‬‭perform‬
‭a‬ ‭number‬ ‭o f‬ ‭functions‬ ‭like‬ ‭playing‬ ‭music,‬ ‭playing‬ ‭games,‬‭payroll‬‭processing‬‭and‬‭so‬
‭o n.‬
‭(b)‬ ‭Special‬ ‭Purpose‬ ‭Computers:‬ ‭-‬ ‭These‬ ‭are‬ ‭computers‬ ‭that‬ ‭are‬ ‭designed‬ ‭to‬
‭perform one task only, for example, to monitor patients in hospital.‬
‭(c)‬‭Analogue Computers‬‭: these handle data in continuously‬‭varying form.‬
‭(d) Digital Computers‬‭: Handle data in discrete values;‬‭that is in 0s and 1s.‬
‭(e)‬ ‭Embedded‬ ‭Computers:‬ ‭–‬ ‭Refers‬ ‭to‬ ‭use‬ ‭o f‬ ‭microprocessors‬ ‭in‬ ‭non-computer‬
‭equipment‬ ‭like‬ ‭in‬ ‭cameras,‬ ‭washing‬ ‭machines,‬ ‭watches,‬ ‭etc.‬ ‭These‬ ‭are‬ ‭normally‬
‭dedicated‬ ‭for‬ ‭a‬ ‭specific‬ ‭task‬ ‭they‬ ‭are‬ ‭designed‬ ‭for.‬ ‭Embedded‬ ‭computers‬ ‭are‬ ‭also‬
‭found‬‭in‬‭household‬‭items‬‭like‬‭camera,‬‭microwave,‬‭washing‬‭machine,‬ ‭video‬‭recorder,‬
‭fridge,‬ ‭sewing‬ ‭machine,‬ ‭air‬ ‭conditioning,‬ ‭electronic‬ ‭toys,‬ ‭rice‬ ‭cooker‬ ‭dish‬ ‭washer,‬
‭Televisions, alarms, clock, radio, DVD players, etc.‬
‭Microprocessor controlled devices have the following advantages:‬
‭(a)‬‭To Manufacturer:‬
‭-‬ ‭Fewer breakdown and repairs. They are therefore easier to repair and service‬
‭-‬ ‭It is cheap as there are fewer parts to assemble‬
‭-‬ ‭Reliable‬
‭-‬ ‭Improve quality control‬

(‭ b)‬‭To Customers‬
‭-‬ ‭Robust and therefore fewer repair bills‬
‭-‬ ‭Low power consumption‬
‭-‬ ‭Cheap to buy‬
‭-‬ ‭Faster processing‬
‭-‬ ‭More versatile‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭132‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭-‬ ‭Efficient since they can be dedicated to a specific task‬

‭Advantages of using computers‬


‭✔‬ ‭They‬ ‭process‬ ‭data‬ ‭at‬ ‭very‬ ‭high‬ ‭speed,‬ ‭thus‬ ‭large‬ ‭volumes‬ ‭o f‬ ‭goods‬ ‭can‬ ‭be‬
‭produced.‬
‭✔‬ ‭Computers‬ ‭are‬ ‭very‬ ‭accurate‬ ‭in‬‭making‬‭calculations‬‭and‬‭thus‬‭ensure‬‭that‬‭no‬
‭calculation errors occur.‬
‭✔‬ ‭Computers are very reliable to use since they rarely makes mistakes.‬
‭✔‬ ‭Computers store large volumes of data for a long period of time.‬
‭✔‬ ‭Computers‬ ‭cut‬ ‭labour‬ ‭costs‬ ‭as‬ ‭they‬ ‭can‬ ‭perform‬ ‭duties‬ ‭that‬ ‭need‬ ‭many‬
‭people.‬‭They‬‭replace‬‭humans‬‭and‬‭thus‬‭cut‬‭labour‬‭costs‬‭o n‬‭wages,‬‭medical‬‭aid,‬
‭retirement benefits, leave payments, etc.‬
‭✔‬ ‭Computers‬ ‭can‬ ‭work‬‭for‬‭24‬‭hours‬‭a‬‭day‬‭with‬‭no‬‭complains‬‭as‬‭humans.‬‭They‬
‭do not get tired.‬
‭✔‬ ‭Computers‬ ‭create‬ ‭employment‬ ‭for‬ ‭the‬ ‭community,‬ ‭for‬ ‭example,‬ ‭computer‬
‭teachers‬ ‭(tutors),‬ ‭programmers,‬ ‭computer‬ ‭technicians,‬ ‭database‬
‭administrators, etc.‬
‭✔‬ ‭High quality goods are produced using computers.‬
‭✔‬ ‭Ensures efficient, easier and faster communication through the internet.‬

‭Disadvantages of using computers‬


‭✔‬ ‭Continuous‬ ‭usage‬ ‭can‬ ‭lead‬ ‭to‬ ‭health‬ ‭problems‬ ‭like‬ ‭Repetitive‬ ‭Strain‬ ‭Injury‬
‭(RSI), back ache, eye problems, etc.‬
‭✔‬ ‭Lead‬‭to‬‭increase‬‭in‬‭computer‬‭crimes‬‭like‬‭computer‬‭fraud,‬‭hacking,‬‭music‬‭and‬
‭software‬ ‭piracy,‬‭data‬‭theft‬‭using‬‭computers,‬‭identity‬‭theft,‬‭sending‬‭o f‬‭viruses,‬
‭etc.‬
‭✔‬ ‭Can‬ ‭lead‬ ‭to‬ ‭unemployment‬ ‭since‬ ‭computers‬ ‭can‬‭replace‬‭human‬‭labour‬‭as‬‭in‬
‭car assemblies.‬
‭✔‬ ‭Expenses related to repairs, maintenance and safety can be high.‬
‭✔‬ ‭They only work when there is electricity.‬
‭NB‬‭*‬
‭Computer‬ ‭c rime:‬ ‭the‬ ‭use‬ ‭of‬ ‭computer‬ ‭to‬ ‭perform‬ ‭unlawful‬ ‭activities,‬ ‭e.g.‬ ‭piracy,‬
‭hacking, etc‬
‭Software‬ ‭piracy‬‭:‬ ‭illegal‬ ‭copying,‬ ‭selling‬ ‭and‬ ‭buying‬ ‭copyrighted‬ ‭software‬ ‭without‬
‭certification.‬
‭Hacking‬‭:‬‭Obtaining‬‭unauthorised‬‭accessed‬‭to‬‭protected‬‭and‬‭secure‬‭computer‬‭systems‬‭or‬
‭network, usually using intelligent methods like cracking passwords‬
‭Computer‬ ‭fraud‬‭:‬ ‭improper‬ ‭electronic‬ ‭transfer‬ ‭of‬ ‭funds‬ ‭from‬ ‭one‬ ‭account‬ ‭to‬ ‭another‬
‭using computers‬
‭Copyright‬‭:‬ ‭A‬ ‭document‬ ‭granting‬ ‭exclusive‬ ‭right‬ ‭to‬ ‭use,‬ ‭publish‬ ‭and‬ ‭sell‬ ‭software,‬
‭musical or artistic work.‬
‭End-user‬‭:‬ ‭A‬ ‭person‬ ‭or‬ ‭organisation‬ ‭who‬ ‭are‬ ‭the‬ ‭final‬ ‭beneficiaries‬ ‭of‬‭a‬‭program‬‭or‬‭a‬
‭device like a computer‬‭.‬

‭ actors To Consider When Buying A Computer‬


F
‭-Hard‬ ‭disk‬ ‭storage‬ ‭c apacity‬‭:‬ ‭Affects‬ ‭the‬ ‭volume‬ ‭o f‬ ‭data‬‭that‬‭can‬‭be‬‭stored‬‭by‬‭the‬
‭computer.‬
‭-RAM‬‭size‬‭:‬‭affect‬‭the‬‭number‬‭o f‬‭programs‬‭that‬‭can‬‭be‬‭run‬‭o n‬‭the‬‭computer‬‭and‬‭the‬
‭overall speed of the computer. The bigger the RAM size the better.‬
‭-Processor‬ ‭Speed‬‭:‬ ‭Determines‬ ‭the‬‭amount‬‭o f‬‭data‬‭that‬‭can‬‭be‬‭processed‬‭at‬‭a‬‭given‬
‭period‬ ‭o f‬ ‭time.‬ ‭The‬ ‭processor‬ ‭speed‬ ‭can‬ ‭be‬‭affected‬‭by‬‭clock‬‭speed,‬‭word‬‭size‬‭(16,‬
‭32, 64, 128 bits), bus size.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭133‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ Application‬‭intended‬‭for‬‭:‬‭what‬‭the‬‭computer‬‭will‬‭be‬‭used‬‭for,‬‭general‬‭purpose‬‭o r‬
‭specialised purpose.‬
‭-Method of operating the computer‬‭: single user, multi-access,‬‭etc.‬
‭- Number of Input and output devices it can handle.‬

‭ LEMENTS/COMPONENTS OF A COMPUTER‬
E
‭The‬ ‭main/major‬ ‭elements‬ ‭(components)‬ ‭o f‬ ‭a‬ ‭computer‬ ‭are‬ ‭illustrated‬ ‭o n‬ ‭the‬
‭diagram‬ ‭below;‬ ‭namely‬ ‭Input‬ ‭Devices,‬ ‭Storage‬ ‭Devices,‬ ‭Processing‬ ‭Device‬ ‭and‬
‭Output Devices‬‭.‬

‭ B:‬‭Internal‬‭Components‬‭of‬‭a‬‭computer:‬‭refers‬‭to‬‭the‬‭components‬‭o f‬‭a‬‭processor,‬
N
‭which are Control Unit, Arithmetic and Logic Unit, Registers and Clock‬
‭Internal‬ ‭components‬ ‭can‬ ‭also‬ ‭include‬ ‭componets‬ ‭enclosed‬ ‭inside‬ ‭the‬ ‭CPU‬ ‭casing‬
‭such as; buses, fans, memory (RAM and ROM), etc‬

‭ ardware‬‭:‬ ‭These‬ ‭are‬ ‭parts‬ ‭o f‬ ‭a‬ ‭computer‬ ‭that‬ ‭exits‬ ‭in‬ ‭physical‬ ‭form,‬ ‭for‬ ‭example‬
H
‭mouse,‬ ‭keyboard.‬ ‭Hardware‬ ‭refers‬ ‭to‬ ‭tangible‬ ‭devices‬ ‭o f‬ ‭a‬ ‭computer.‬ ‭Hardware‬ ‭is‬
‭grouped‬‭into:‬‭Input‬‭Hardware,‬‭Processing‬‭Hardware,‬‭Output‬‭Hardware,‬‭Storage‬
‭devices and communication hardware.‬

I‭ nput Hardware‬
‭These‬‭are‬‭devices‬‭used‬‭to‬‭enter/feed‬‭data‬‭into‬‭the‬‭computer,‬‭for‬‭example‬‭mouse‬‭and‬
‭keyboard. Below are some of the input hardware and their uses:‬
‭(i)‬‭Keyboard:‬‭It‬‭is‬‭a‬‭device‬‭used‬‭to‬‭enter‬‭data‬‭and‬‭instructions‬‭into‬‭the‬‭computer‬‭by‬
‭typing.‬‭It‬‭is‬‭a‬‭manual‬‭input‬‭device.‬‭It‬‭is‬‭similar‬‭to‬‭the‬‭traditional‬‭typewriter.‬‭It‬‭is‬‭used‬
‭to‬ ‭enter‬ ‭alphabetic‬ ‭letters‬ ‭(A-Z-both‬ ‭lower‬ ‭case‬ ‭and‬ ‭upper‬ ‭case),‬ ‭numbers‬ ‭(0-9,‬
‭positive‬ ‭and‬ ‭negative)‬ ‭and‬ ‭o ther‬ ‭special‬ ‭characters‬ ‭like‬ ‭the‬ ‭%,‬ ‭$,‬ ‭coma,‬ ‭?,‬ ‭and‬ ‭the‬
‭space.‬ ‭Keyboard‬ ‭entry‬ ‭o f‬ ‭data‬ ‭is‬ ‭manual‬ ‭and‬ ‭its‬ ‭excessive‬ ‭use‬ ‭without‬ ‭breaks‬ ‭will‬
‭cause‬‭Repetitive Strain Injury (RSI).‬
‭*‬‭NB‬‭:‬ ‭-‬ ‭A‬ ‭c haracter‬ ‭is‬ ‭any‬ ‭symbol,‬ ‭digit‬ ‭o r‬ ‭letter‬ ‭that‬ ‭can‬ ‭be‬ ‭entered‬ ‭into‬ ‭the‬
‭computer,‬‭eg.‬‭$,‬‭%,‬‭5,‬‭h,‬‭etc.‬ ‭These‬‭characters‬‭can‬‭be‬‭numeric‬‭(numbers‬‭0-9,‬‭positive‬
‭and‬‭negative),‬‭alphabetic‬‭(letters‬‭A-Z,‬‭both‬‭lower‬‭and‬‭upper‬‭case),‬‭alphanumeric‬‭data‬
‭(a‬ ‭combination‬ ‭o f‬ ‭both‬ ‭numeric‬ ‭and‬ ‭alphabetic‬ ‭characters)‬ ‭and‬ ‭special‬ ‭characters‬
‭(space, $, >, etc.).‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭134‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
*‭ ‬‭NB‬‭:‬ ‭-‬ ‭Control‬ ‭Character‬‭:‬ ‭-‬ ‭Refers‬ ‭to‬
‭non-printable‬ ‭character‬ ‭code‬ ‭o r‬
‭number‬‭in‬‭the‬‭character‬‭set‬‭that‬‭do‬‭not‬
‭represent‬ ‭a‬ ‭written‬ ‭symbol,‬ ‭e.g.‬
‭carriage‬ ‭return,‬ ‭tab‬ ‭key,‬ ‭etc.‬‭These‬‭are‬
‭mostly‬ ‭used‬ ‭in‬ ‭peripheral‬ ‭devices‬
‭control‬ ‭and‬ ‭for‬ ‭communication‬
‭purposes,‬‭for‬‭example,‬‭carriage‬‭return,‬
‭tab‬ ‭o r‬ ‭backspace;‬ ‭and‬‭o thers‬‭typed‬‭by‬
‭depressing‬‭a‬‭key‬‭and‬‭the‬‭control‬‭key‬‭at‬
‭the same time.‬
‭*‬‭NB‬‭:-‬‭Extended‬
‭Standard keyboard‬ ‭Binary-Coded-Decimal‬ ‭Interchange‬
‭Code‬ ‭(EBCDIC‬‭)‬ ‭an‬ ‭8-bit‬ ‭character‬ ‭set‬
‭and‬ ‭encoding‬ ‭representing‬ ‭256‬
‭alphanumeric and special characters‬

-‭ ‬ ‭ASCII‬ ‭-‬ ‭American‬ ‭Standard‬ ‭Code‬ ‭for‬ ‭Information‬ ‭Interchange:‬ ‭-‬ ‭a‬ ‭code‬ ‭for‬
‭information‬ ‭exchange‬ ‭between‬ ‭computers‬ ‭made‬‭by‬‭different‬‭companies;‬‭in‬‭which‬‭a‬
‭string‬ ‭o f‬ ‭7‬ ‭binary‬ ‭digits‬ ‭represents‬ ‭each‬ ‭character;‬ ‭used‬ ‭in‬ ‭most‬ ‭microcomputers.‬
‭Each character has its ASCII binary code that can be understood by the computer.‬

‭Keyboards can be of the following types:‬


‭(a)‬‭Concept‬‭keyboard‬‭:‬‭uses‬‭icons‬‭o r‬‭phrases‬‭instead‬‭o f‬‭standard‬‭letters,‬‭e.g.‬‭they‬
‭can‬ ‭have‬ ‭the‬‭following‬‭keys:‬‭%,‬‭tax,‬‭CH,‬‭Total,‬‭etc.‬‭Most‬‭are‬‭faster‬‭for‬‭making‬
‭menu‬ ‭choices.‬ ‭They‬ ‭have‬ ‭fewer‬ ‭keys.‬ ‭Mostly‬ ‭popular‬ ‭for‬ ‭use‬ ‭in‬ ‭bars,‬
‭supermarkets,‬‭fast‬‭food‬‭restaurants,‬‭etc.‬‭They‬‭are‬‭quick‬‭and‬‭easy‬‭to‬‭use.‬‭They‬
‭are also waterproof. The keys are tamper proof.‬
‭(b)‬‭Braille keyboard‬‭: Suitable for the blind.‬
‭(c)‬‭Standard‬ ‭keyboard:‬ ‭this‬ ‭is‬ ‭the‬ ‭normal,‬ ‭also‬ ‭called‬ ‭Qwerty‬ ‭keyboard.‬
‭Advantages of standard keyboards:‬
‭-‬ ‭Most people find them easy to use‬
‭-‬ ‭Enable fast entry of text data‬

‭ isadvantages of standard keyboards‬


D
-‭ ‬ ‭They are manual and therefore slower than most automatic entry methods‬
‭-‬ ‭Errors are very common using keyboards.‬
‭-‬ ‭Can be difficult to use for others.‬
‭-‬ ‭Take up valuable desk space as they are large.‬

‭(d)‬‭Numeric‬ ‭keypads:‬ ‭mostly‬ ‭used‬ ‭to‬ ‭enter‬ ‭numbers‬ ‭o nly.‬ ‭Used‬ ‭o n‬ ‭ATMs,‬ ‭to‬
‭enter‬ ‭PIN‬ ‭and‬ ‭amount‬ ‭to‬ ‭be‬ ‭withdrawn.‬ ‭Also‬ ‭found‬ ‭o n‬ ‭cell‬ ‭and‬ ‭telephones,‬
‭Chip‬ ‭and‬ ‭pin‬ ‭devices,‬ ‭and‬ ‭o n‬ ‭Electronic‬‭Point‬‭o f‬‭Sale‬‭terminals‬‭(EPOS).‬‭They‬
‭are‬‭faster‬‭in‬‭entering‬‭numeric‬‭data‬‭as‬‭compared‬‭to‬‭standard‬‭keyboards,‬‭very‬
‭easy‬ ‭to‬ ‭carry‬ ‭around‬ ‭if‬ ‭found‬‭o n‬‭cell‬‭phones.‬‭However,‬‭they‬‭have‬‭very‬‭small‬
‭keys‬ ‭which‬ ‭can‬ ‭be‬ ‭difficult‬ ‭to‬ ‭use.‬ ‭It‬ ‭is‬ ‭difficult‬‭to‬‭use‬‭them‬‭for‬‭entering‬‭text‬
‭data.‬

(‭ ii)‬ ‭Mouse:‬ ‭It‬ ‭is‬ ‭a‬ ‭pointing‬ ‭device‬ ‭used‬ ‭to‬ ‭enter‬ ‭data‬ ‭and‬ ‭instructions‬ ‭into‬ ‭the‬
‭computer‬‭by‬‭clicking.‬‭A‬‭mouse‬‭has‬‭either‬‭o ne,‬‭two‬‭o r‬‭three‬‭buttons.‬‭A‬‭mouse‬‭can‬‭be‬
‭cable or wireless. The mouse is also used to:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭135‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ S‭ elect options from a menu‬
‭-‬ ‭Position the cursor when editing text/typing‬
‭-‬ ‭Select an object for drawing and for editing diagrams‬
‭-‬ ‭Select icons/text to be formatted, deleted or edited.‬
‭-‬ ‭Control movement of pointer on the screen.‬

I‭ t‬ ‭can‬ ‭also‬ ‭be‬ ‭used‬ ‭for‬ ‭pointing‬ ‭and‬ ‭selecting‬


‭items.‬ ‭Clicking‬ ‭is‬ ‭the‬ ‭process‬ ‭o f‬ ‭pressing‬ ‭and‬
‭releasing the mouse button.‬
‭Mouse‬

‭Advantages of mouse‬
‭-‬ ‭It‬‭is‬‭a‬‭fast‬‭method‬‭o f‬‭entering‬‭data‬‭and‬‭for‬‭selecting‬‭items‬‭as‬‭compared‬‭to‬‭the‬
‭keyboard.‬
‭-‬ ‭It is faster to move cursor around the screen using a mouse than a keyboard.‬
‭-‬ ‭Usually supplied with the computer and so there are no additional costs.‬
‭-‬ ‭Very easy to use for most users.‬
‭-‬ ‭Take up very small area of the desk‬
‭-‬ ‭Very fast to switch between programs‬

‭Disadvantages of mouse‬
‭-‬ ‭Needs a flat surface on which to operate‬
‭-‬ ‭Can be easily stolen or vandalised‬
‭-‬ ‭Some people find it very difficult to use‬
‭-‬
‭(iii) Touchpad‬
‭These‬‭are‬‭pointing‬‭devices‬‭used‬‭o n‬‭laptops,‬‭where‬‭o ne‬‭moves‬‭a‬‭figure‬‭to‬‭control‬‭the‬
‭pointer‬‭o n‬‭the‬‭screen.‬‭Their‬‭uses‬‭are‬‭similar‬‭to‬‭those‬‭o f‬‭mouse.‬‭They‬‭aid‬‭portability‬
‭since‬‭they‬‭are‬‭attached‬‭to‬‭the‬‭whole‬‭computer‬‭system.‬‭Can‬‭also‬‭be‬‭used‬‭where‬‭there‬
‭are‬‭no‬‭flat‬‭surfaces‬‭available.‬‭However,‬‭they‬‭are‬‭difficult‬‭to‬‭use,‬‭e.g.‬‭when‬‭doing‬‭drag‬
‭and drop.‬
‭(iv)‬ ‭Scanner:‬ ‭an‬ ‭input‬ ‭device‬ ‭used‬ ‭to‬ ‭convert‬ ‭images‬ ‭from‬‭paper‬‭(hard‬‭copy)‬‭into‬
‭electrical signals for input into the computer.‬
‭The‬ ‭images‬ ‭can‬ ‭then‬ ‭be‬ ‭edited,‬
‭printed‬ ‭o r‬ ‭saved.‬ ‭Mostly‬ ‭used‬ ‭to‬
‭scan‬‭pictures,‬‭photographs,‬‭etc.‬‭they‬
‭can‬ ‭use‬ ‭OCR,‬ ‭convert‬ ‭to‬ ‭Word‬ ‭o r‬
‭pdf format directly.‬

‭ latbed‬ ‭scanners‬ ‭have‬ ‭the‬ ‭paper‬


F
‭placed‬ ‭o n‬ ‭top‬ ‭o f‬ ‭them,‬ ‭in‬ ‭a‬ ‭similar‬
‭Scanners‬ ‭way‬ ‭to‬ ‭a‬ ‭photocopier.‬ ‭These‬ ‭are‬
‭more‬ ‭expensive‬ ‭than‬ ‭hand-held‬
‭scanners‬ ‭but‬ ‭they‬ ‭are‬ ‭usually‬ ‭able‬
‭to‬ ‭produce‬ ‭higher‬ ‭resolution‬
‭images.‬ ‭They‬ ‭are‬ ‭very‬ ‭accurate‬ ‭in‬
‭scanning.‬ ‭Images‬ ‭are‬ ‭stored‬ ‭for‬
‭later‬ ‭editing.‬ ‭Quality‬ ‭o f‬ ‭scanned‬
‭image‬‭can‬‭depend‬‭o n‬‭the‬‭resolution‬
‭o f scanner.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭136‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

(‭ v)‬ ‭Digital‬ ‭Camera:‬ ‭A‬ ‭device‬ ‭use‬ ‭to‬ ‭capture‬ ‭photographs,‬ ‭films,‬ ‭videos‬ ‭o r‬ ‭a‬
‭combination of both for entry into the computer where they can be edited.‬

-‭ ‬ ‭no film is needed (saves costs for purchasing films and developing the film)‬
‭-‬ ‭Unwanted images can be deleted straight away‬
‭-‬ ‭Images‬‭are‬‭already‬‭digital‬‭and‬‭therefore‬‭can‬‭be‬‭transferred‬‭to‬‭a‬‭computer‬‭for‬
‭editing immediately,‬
‭-‬ ‭Easier and faster to upload photos to the computer‬
‭-‬ ‭Produce better quality images than the traditional camera‬
‭However:‬
‭-‬ ‭Images need to be compressed‬
‭-‬ ‭Needs those who are computer literate to use it efficiently‬
‭(vi)‬ ‭Touch‬ ‭Screen:‬ ‭A‬ ‭screen‬ ‭display‬ ‭o n‬ ‭which‬ ‭you‬ ‭could‬ ‭enter‬ ‭data‬ ‭by‬
‭pointing/tapping‬ ‭with‬ ‭a‬ ‭finger‬ ‭o n‬ ‭intended‬ ‭o ption.‬ ‭Used‬ ‭o n‬ ‭(ATMs)-Automated‬
‭Teller Machines‬‭, cell phones, computers, etc.‬

‭ ‬ ‭touch‬ ‭screen‬ ‭is‬ ‭both‬ ‭an‬ ‭input‬ ‭and‬ ‭o utput‬


A
‭device.‬
‭A‬ ‭touch‬ ‭sensitive‬ ‭visual‬ ‭display‬ ‭unit‬ ‭(VDU)‬‭o r‬
‭screen‬ ‭has‬ ‭a‬ ‭grid‬ ‭o f‬‭light‬‭beams‬‭o r‬‭fine‬‭wires‬
‭criss-crossing‬ ‭the‬ ‭screen‬ ‭that‬ ‭are‬ ‭used‬ ‭to‬
‭detect‬ ‭touch.‬ ‭Many‬ ‭mobile‬ ‭phones‬ ‭use‬ ‭touch‬
‭screens‬ ‭and‬‭do‬‭away‬‭with‬‭the‬‭keypad‬‭entirely.‬
‭They're‬ ‭o ften‬ ‭used‬ ‭o n‬ ‭cash‬ ‭machines‬ ‭and‬ ‭in‬
‭shopping‬ ‭centres‬ ‭too.‬ ‭Touch‬ ‭screens‬ ‭are‬
‭Touch screen‬ ‭robust,‬‭easy‬‭to‬‭choose‬‭o ptions.‬‭Faster‬‭to‬‭make‬
‭selections.‬‭User‬‭friendly‬‭(less‬‭training‬‭needed).‬
‭Tamper‬ ‭proof.‬ ‭However,‬ ‭they‬ ‭have‬ ‭limited‬
‭number‬‭o f‬‭o ptions,‬‭leads‬‭to‬‭RSI,‬‭screen‬‭can‬‭get‬
‭dirty by constant touching.‬

(‭ vii) Magnetic Stripe Readers‬


‭Are‬ ‭devices‬ ‭to‬ ‭read‬ ‭information‬ ‭o n‬ ‭the‬ ‭magnetic‬ ‭strip‬ ‭found‬ ‭o n‬ ‭credit‬ ‭cards.‬ ‭The‬
‭stripe‬ ‭contains‬ ‭information‬ ‭like‬ ‭account‬ ‭number,‬ ‭sort‬ ‭code,‬ ‭expiry‬ ‭date‬ ‭and‬ ‭start‬
‭date.‬
‭Uses‬‭:‬ ‭used‬ ‭to‬ ‭read‬ ‭debit‬ ‭and‬ ‭credit‬‭card‬‭data‬‭o n‬‭ATMs‬‭and‬‭EFTPOS‬‭terminals.‬‭Also‬
‭used to read security cards for entry into buildings, hotel rooms, etc.‬
‭Advantages‬‭:‬ ‭very‬ ‭fast‬ ‭data‬ ‭entry.‬ ‭Error‬ ‭free‬ ‭data‬ ‭entry‬ ‭since‬‭no‬‭typing‬‭is‬‭involved.‬
‭Information‬ ‭o n‬ ‭magnetic‬ ‭stripe‬ ‭is‬ ‭secure‬ ‭since‬ ‭no‬ ‭human‬ ‭can‬ ‭read‬ ‭it.‬ ‭Can‬ ‭prevent‬
‭access‬ ‭to‬ ‭restricted‬ ‭areas.‬ ‭Magnetic‬ ‭stripes‬ ‭are‬ ‭not‬ ‭affected‬ ‭by‬ ‭o il,‬‭water,‬‭etc.‬‭there‬
‭are no moving parts and therefore are robust.‬
‭Disadvantages‬‭:‬ ‭if‬‭the‬‭magnetic‬‭stripe‬‭is‬‭damaged,‬‭all‬‭data‬‭is‬‭lost.‬‭They‬‭do‬‭not‬‭work‬
‭from a distance, need contact with the reader.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭137‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
(‭ viii)‬ ‭Joystick:‬ ‭A‬ ‭device‬ ‭specifically‬ ‭used‬ ‭for‬ ‭playing‬‭games.‬‭Can‬‭be‬‭used‬‭to‬‭control‬
‭pointer‬ ‭o n‬ ‭screen‬ ‭by‬ ‭gripping‬ ‭the‬ ‭stick‬‭when‬‭making‬‭selections.‬ ‭Used‬‭also‬‭in‬‭flight‬
‭simulators.‬

I‭ t‬‭can‬‭be‬‭an‬‭alternative‬‭to‬‭a‬‭mouse.‬‭It‬
‭consists‬ ‭o f‬ ‭a‬ ‭base‬ ‭and‬ ‭a‬ ‭stick‬
‭perpendicular‬ ‭to‬ ‭the‬ ‭base.‬ ‭The‬ ‭stick‬
‭can‬ ‭be‬ ‭moved‬ ‭in‬ ‭any‬ ‭direction,‬
‭enabling‬ ‭the‬ ‭user‬ ‭to‬ ‭move‬ ‭an‬ ‭o bject‬
‭around‬ ‭the‬ ‭computer‬ ‭screen.‬ ‭A‬
‭joystick‬ ‭can‬ ‭perform‬ ‭a‬ ‭similar‬
‭function‬ ‭to‬ ‭a‬ ‭mouse‬ ‭o r‬‭trackball,‬‭but‬
‭is‬ ‭o nly‬ ‭commonly‬ ‭used‬ ‭for‬ ‭playing‬
‭games,‬ ‭controlling‬ ‭aircraft,‬
‭Two types of joystick‬ ‭controlling motorised wheelchair.‬
‭In‬ ‭construction,‬ ‭joysticks‬ ‭are‬‭used‬‭to‬
‭control machinery such as cranes.‬
‭ dvantage:‬ ‭Easier‬ ‭to‬‭navigate‬‭round‬
A
‭screen, control is in 3-dimension.‬

(‭ ix)‬‭Tracker‬‭ball:‬‭It‬‭is‬‭an‬‭input‬‭device‬‭with‬‭a‬‭small‬‭ball‬‭that‬‭can‬‭be‬‭moved‬‭by‬‭passing‬
‭the‬‭palm‬‭o f‬‭your‬‭hand‬‭over‬‭it.‬‭This‬‭will‬‭move‬‭an‬‭arrow‬‭o n‬‭the‬‭screen‬‭and‬‭therefore‬
‭can replace a mouse.‬
‭It‬ ‭is‬ ‭used‬ ‭to‬‭draw‬‭designs‬‭and‬‭to‬
‭select‬ ‭o ptions‬ ‭from‬ ‭menu.‬ ‭Used‬
‭as‬ ‭an‬ ‭alternative‬ ‭to‬ ‭a‬ ‭mouse.‬ ‭To‬
‭o perate‬ ‭it‬ ‭the‬ ‭user‬ ‭rotates‬ ‭the‬
‭ball‬ ‭which‬ ‭moves‬ ‭the‬ ‭pointer‬ ‭o n‬
‭screen.‬‭They‬‭are‬‭particularly‬‭easy‬
‭to‬ ‭use‬ ‭for‬ ‭those‬ ‭with‬ ‭limited‬
‭Tracer ball‬
‭movement‬‭in‬‭their‬‭hands‬‭and‬‭are‬
‭o ften‬ ‭used‬ ‭in‬ ‭Computer‬ ‭Aided‬
‭Design‬ ‭(CAD)‬ ‭for‬ ‭their‬ ‭increased‬
‭precision over a mouse.‬

‭Advantages of trackball‬
‭-‬ ‭It is stationery and therefore do not need a flat surface to move on‬
‭-‬ ‭Less likely to get damaged than mouse‬
‭-‬ ‭Less tiring as less movement is needed‬
‭-‬ ‭Can be useful in laptops‬

‭Disadvantages‬
‭-‬ ‭Rolling the ball is less effective than using mouse‬
‭-‬ ‭Can be difficult to control‬
‭-‬ ‭Not supplied as standard device, so extra cost is incurred‬
‭-‬ ‭Muscles can be strained due to repeated movement‬

(‭ x) Remote Control‬
‭Device‬ ‭used‬ ‭to‬ ‭control‬ ‭the‬ ‭o peration‬ ‭o f‬ ‭o ther‬ ‭devices‬ ‭remotely‬ ‭by‬ ‭using‬ ‭infra-red‬
‭signals. Has button to select options, e.g. TV stations, volume, etc.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭138‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Uses‬
‭-‬ ‭Used in home entertainment devices like TVs, DVD players, HIFIs, etc‬
‭-‬ ‭Remote controls for multimedia systems‬
‭-‬ ‭Stop/ start machinery in industrial applications‬
‭Advantages:‬‭Allows‬‭devices‬‭to‬‭be‬‭controlled‬‭from‬‭a‬‭distance,‬‭Flexible‬‭to‬‭the‬‭disabled,‬
‭safer to use in chemical processes.‬
‭Disadvantages:‬ ‭People‬ ‭arm‬ ‭problems/disabilities‬ ‭cannot‬ ‭use‬ ‭them,‬ ‭signals‬ ‭can‬ ‭be‬
‭blocked (need a line of sight)‬

(‭ xi)‬ ‭Microphone:‬ ‭It‬ ‭is‬ ‭an‬ ‭analogue‬ ‭input‬ ‭device‬ ‭that‬ ‭recognises‬ ‭human‬ ‭voice‬ ‭for‬
‭data entry into the computer.‬
‭Microphones‬ ‭are‬ ‭used‬ ‭to‬ ‭input‬ ‭sound.‬
‭In‬ ‭computing,‬ ‭they‬ ‭can‬ ‭be‬ ‭used‬ ‭with‬
‭voice‬ ‭recognition‬ ‭software‬ ‭and‬‭a‬‭word‬
‭processing‬ ‭application‬ ‭to‬ ‭enter‬ ‭text.‬
‭Webcams‬‭commonly‬‭have‬‭microphones‬
‭built-in too.‬

*‭ ‬‭NB‬‭:-An‬ ‭analogue‬ ‭device‬ ‭is‬ ‭a‬ ‭device‬ ‭that‬ ‭recognises‬ ‭data‬ ‭in‬ ‭continuously‬ ‭varying‬
‭form,‬‭e.g.‬‭microphone,‬‭wall‬‭watches‬‭(with‬‭minute,‬‭hour‬‭and‬‭second‬‭hand),‬‭fuel‬‭petrol‬
‭gauge, speedometer, etc.‬
‭A‬ ‭microphone‬ ‭is‬ ‭used‬ ‭in‬ ‭voice‬ ‭recognition‬ ‭systems‬ ‭(voice‬ ‭synthesis)‬‭.‬ ‭These‬ ‭are‬
‭computerised‬‭systems‬‭that‬‭allow‬‭users‬‭to‬‭communicate‬‭with‬‭the‬‭computer‬‭by‬‭talking‬
‭(voice input).‬‭Such systems have the following advantages:‬
‭-‬ ‭The systems are over 90% accurate.‬
‭-‬ ‭They are appropriate for the handicapped, especially those without hands.‬
‭-‬ ‭They are very fast in entering data and in giving instructions to the computer.‬
‭-‬ ‭They are speaker independent.‬
‭-‬ ‭They can recognise natural language.‬

‭Disadvantages:‬
‭-‬ ‭Older systems are speaker dependent.‬
‭-‬ ‭They‬ ‭allow‬ ‭the‬ ‭user‬ ‭to‬ ‭speak‬ ‭slowly,‬ ‭using‬ ‭specific‬ ‭words‬ ‭that‬ ‭were‬
‭programmed for it to understand.‬
‭NB‬‭:‬‭Multimedia‬‭speakers,‬‭sound‬‭cards,‬‭a‬‭microphone‬‭and‬‭voice‬‭recognition‬‭software‬
‭are needed in voice recognition systems.‬

(‭ xii)‬ ‭Light‬ ‭pen:‬ ‭A‬ ‭ballpoint‬‭shaped‬‭device‬‭used‬‭to‬‭enter‬‭data‬‭by‬‭writing‬‭o n‬‭an‬‭ink‬


‭pad.‬ ‭It‬ ‭is‬ ‭also‬ ‭used‬ ‭to‬ ‭make‬ ‭alterations‬ ‭o n‬ ‭the‬ ‭screen‬ ‭to‬ ‭the‬ ‭drawings,‬ ‭to‬ ‭write‬
‭directly on the screen and to select commands.‬

‭Light pen‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭139‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
(‭ xiii)‬ ‭Kimball‬ ‭Tags:‬ ‭These‬‭are‬‭punched‬‭cards‬‭with‬‭a‬‭magnetic‬‭strip‬‭which‬‭contains‬
‭details of a product, mostly clothes in a shop.‬

(‭ xiv)‬ ‭Graphics‬ ‭tablet:‬ ‭Devices‬‭used‬‭to‬‭provide‬‭interface‬‭for‬‭drawing‬‭o n‬‭the‬‭screen‬


‭and links with the light pen. Can also be used with a stylus. Can be used for drawing‬

(‭ xv)‬ ‭Webcam:‬ ‭A‬ ‭digital‬ ‭video‬ ‭camera‬ ‭designed‬ ‭to‬ ‭take‬ ‭digital‬ ‭photographs‬ ‭and‬
‭transmit‬‭them‬‭over‬‭the‬‭internet‬‭o r‬‭to‬‭the‬‭computer.‬‭They‬‭do‬‭not‬‭have‬‭own‬‭memory.‬
‭Laptops have their own web cam.‬
‭Uses‬‭:‬ ‭viewing‬ ‭each‬ ‭o ther‬ ‭when‬ ‭chatting‬ ‭o n‬ ‭internet.‬ ‭For‬ ‭video‬ ‭conferencing.‬ ‭For‬
‭taking personal images.‬
‭Advantages‬‭:‬ ‭can‬ ‭be‬ ‭left‬ ‭o n‬ ‭and‬ ‭o nly‬ ‭activated‬ ‭when‬ ‭required.‬‭People‬‭can‬‭see‬‭each‬
‭o ther when chatting.‬

(‭ xvi)‬‭Sensor:‬‭an‬‭input‬‭device‬‭that‬‭automatically‬‭records‬‭physical‬‭data‬‭by‬‭sensing‬‭the‬
‭environment it is supposed to record, e.g. humidity sensor.‬

(‭ xvii)‬ ‭Magnetic‬ ‭Stripes:‬ ‭Magnetic‬ ‭stripes‬ ‭can‬ ‭be‬ ‭seen‬ ‭o n‬ ‭train‬ ‭tickets‬ ‭o r‬ ‭bank‬ ‭o r‬
‭credit cards.‬

(‭ a) Card with magnetic strip‬ ‭(b) Magnetic strip reader‬


‭These‬ ‭stripes‬ ‭hold‬ ‭a‬ ‭small‬ ‭amount‬ ‭o f‬ ‭data‬ ‭(64‬ ‭characters)‬ ‭and‬ ‭can‬ ‭be‬ ‭read‬ ‭by‬ ‭a‬
‭magnetic‬‭stripe‬‭reader‬‭(card‬‭reader)‬‭that‬‭is‬‭connected‬‭to‬‭a‬‭computer‬‭system.‬‭These‬
‭provide‬‭a‬‭quick‬‭and‬‭accurate‬‭way‬‭o f‬‭entering‬‭details‬‭into‬‭a‬‭computer‬‭system‬‭and‬‭are‬
‭simple to operate.‬

(‭ xviii)‬ ‭Smart‬ ‭Card‬ ‭Readers:‬ ‭Similar‬ ‭to‬ ‭magnetic‬‭strip‬‭readers‬‭except‬‭that‬‭they‬‭are‬


‭used‬‭to‬‭read‬‭data‬‭stored‬‭o n‬‭a‬‭chip.‬‭Most‬‭bank‬‭cards‬‭and‬‭credit‬‭cards‬‭are‬‭now‬‭smart‬
‭cards‬‭.‬ ‭Also‬ ‭used‬ ‭o n‬ ‭royalty‬ ‭cards,‬ ‭ID‬ ‭cards,‬ ‭electronic‬ ‭passports‬ ‭and‬ ‭transport‬
‭passes.‬
‭Cards‬ ‭have‬ ‭their‬ ‭own‬ ‭processor‬ ‭and‬‭memory‬
‭that‬‭can‬‭hold‬‭up‬‭to‬‭64KB‬‭o f‬‭data.‬‭The‬‭data‬‭that‬
‭is‬ ‭stored‬ ‭can‬ ‭be‬ ‭updated‬ ‭and‬ ‭the‬ ‭processor‬
‭can process simple programs.‬

‭Smart cards‬
‭-‬ ‭Smart cards are simple to produce‬
‭-‬ ‭Not easily damaged‬
‭-‬ ‭Store a fairly large amount of information‬
‭-‬ ‭Automatic input devices, reduce paperwork‬
‭However:‬
‭-‬ ‭Data can be changed by magnetic fields‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭140‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
-‭ ‬ T ‭ he strip can be damaged by scratching‬
‭-‬ ‭Limited storage capacity‬
‭-‬ ‭Not very secure as thieves can alter the data.‬

‭(xix)‬ ‭Barcode‬ ‭Reader‬‭:‬ ‭These‬ ‭are‬ ‭devices‬ ‭at‬ ‭Electronic‬ ‭Point‬ ‭of‬ ‭Sale‬ ‭terminals‬
(‭ EPOS)‬‭that‬‭read‬‭barcodes‬‭o n‬‭products‬‭for‬‭automatic‬‭data‬‭entry‬‭into‬‭the‬‭computer.‬
‭Mostly‬ ‭used‬ ‭in‬ ‭library‬ ‭systems,‬ ‭luggage‬ ‭handling‬ ‭systems‬ ‭at‬ ‭airports,‬ ‭warehouse‬
‭stock control, etc.‬
‭Barcodes‬ ‭are‬ ‭numbered‬ ‭vertical‬ ‭lines‬
‭and‬ ‭spaces‬‭o f‬‭varying‬‭size‬‭o n‬‭products‬
‭that‬‭provide‬‭data‬‭for‬‭such‬‭a‬‭product‬‭to‬
‭the‬ ‭computer‬ ‭when‬ ‭read‬ ‭by‬ ‭barcode‬
‭readers.‬
‭If‬ ‭the‬ ‭barcode‬ ‭reader‬ ‭fails‬ ‭to‬ ‭read‬ ‭the‬
‭barcodes,‬ ‭data‬ ‭is‬ ‭entered‬ ‭manually‬
‭Barcodes‬
‭through‬ ‭the‬ ‭keyboard‬ ‭by‬ ‭entering‬ ‭the‬
‭numbers below the barcodes.‬

‭Barcodes have the following advantages:‬


‭-‬ ‭They are cheap and easy to use.‬
‭-‬ ‭They are very accurate in entering data.‬
‭-‬ ‭They‬‭are‬‭a‬‭very‬‭fast‬‭means‬‭o f‬‭entering‬‭data‬‭since‬‭they‬‭are‬‭an‬‭automatic‬‭data‬
‭entry method.‬
‭-‬ ‭Customers can be served quickly.‬
‭-‬ ‭Automatic re-ordering of goods in supermarkets is possible.‬
‭-‬ ‭Automatic stock taking is possible.‬
‭-‬ ‭Need for fewer people in the stores thereby cutting labour expenses.‬
‭-‬ ‭Out of date items can be automatically identified.‬
‭-‬ ‭There is no need for supermarket workers to remember prices.‬
‭-‬ ‭It becomes easier to do price changes.‬
‭Information found on barcodes includes:‬
‭-‬ ‭Product name,‬
‭-‬ ‭Check digit,‬
‭-‬ ‭Product number,‬
‭-‬ ‭Country of origin,‬
‭-‬ ‭Manufacturer’s number,‬
‭-‬ ‭Weight.‬
‭*‬‭NB‬‭:-The‬‭PRICE‬‭o f an item is‬‭NOT FOUND‬‭o n the barcode.‬

‭ ow‬ ‭does‬ ‭the‬ ‭computer‬ ‭system‬ ‭c hecks‬ ‭that‬ ‭the‬ ‭barcode‬ ‭has‬ ‭been‬ ‭read‬
H
‭correctly?‬
‭Either the computer performs the following:‬
‭Calculates‬‭the‬‭check‬‭digit;‬‭remainder‬‭=‬‭0‬‭if‬‭barcode‬‭has‬‭been‬‭read‬‭correctly‬‭OR‬‭uses‬
‭the weights and modulus 11 and use remainder‬
‭Areas where barcodes are used:‬
‭-‬ ‭Library book systems‬
‭-‬ ‭Passport and ID card systems‬
‭-‬ ‭Equipment checking systems‬
‭-‬ ‭Automatic stock taking in supermarkets‬

‭(xx)Video digitiser‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭141‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ‬‭video‬‭digitiser‬‭takes‬‭an‬‭image‬‭from‬‭a‬‭video‬‭camera‬‭o r‬‭television‬‭and‬‭digitises‬‭it‬‭so‬
A
‭it‬ ‭can‬‭be‬‭read‬‭by,‬‭and‬‭stored‬‭o n,‬‭a‬‭computer.‬‭Video‬‭sequences‬‭captured‬‭using‬‭video‬
‭digitisers are often used in multimedia presentations.‬

(‭ xxi) Stylus:‬‭device used to write on sensitive pads‬‭o r screen for data entry into the‬
‭computer. Often purchased with touch screens‬

‭ OCUMENT READERS‬
D
‭These‬‭are‬‭devices‬‭used‬‭for‬‭entering‬‭data‬‭automatically‬‭into‬‭the‬‭computer‬‭by‬‭reading‬
‭through documents. These include:‬
‭(i)‬‭Optical‬‭Mark‬‭Recognition‬‭(OMR):‬‭The‬‭Optical‬‭Mark‬‭Readers‬‭use‬‭light‬‭sensitive‬
‭devices‬ ‭to‬ ‭sense‬ ‭pencil‬‭marks‬‭o n‬‭a‬‭piece‬‭o f‬‭paper‬‭for‬‭automatic‬‭data‬‭entry‬‭into‬‭the‬
‭computer.‬ ‭Light‬‭is‬‭reflected‬‭from‬‭the‬‭document‬‭o nto‬‭the‬‭Optical‬‭Mark‬‭Reader‬‭which‬
‭records‬ ‭the‬ ‭o utput.‬ ‭It‬ ‭then‬ ‭records‬ ‭low‬ ‭intensity/zero‬ ‭intensity‬ ‭at‬ ‭certain‬ ‭points.‬
‭OMR‬‭is‬‭mostly‬‭used‬‭in‬‭marking‬‭multiple‬‭c hoice‬‭exams‬‭at‬‭ZJC‬‭and‬‭‘O’‬‭Level,‬‭reading‬
‭pupils’‬ ‭registers,‬‭playing‬‭lotto,‬‭etc.‬‭An‬‭Optical‬‭Mark‬‭Reader‬‭is‬‭the‬‭device‬‭that‬‭is‬‭used‬
‭for automatic data entry in OMR systems.‬
‭-‬ ‭OMR is fast in entering data‬
‭-‬ ‭It is also accurate and reliable in entering data.‬
‭-‬ ‭Has better recognition than OCR‬
‭-‬ ‭Can be prepared where data originates, without machines‬
‭-‬ ‭Errors can be corrected easily‬
‭However:‬
‭-‬ ‭Mark readers are relatively slow‬
‭-‬ ‭Verification of data is difficult‬
‭-‬ ‭Document may be difficult to design‬
‭-‬ ‭Forms must be completed clearly for data to be recorded accurately‬
‭-‬ ‭Papers need to be clean‬

(‭ ii)‬ ‭Optical‬ ‭Character‬ ‭Recognition‬‭(OCR):‬‭It‬‭is‬‭the‬‭use‬‭o f‬‭light‬‭sensitive‬‭devices‬‭to‬


‭recognise‬‭alphabetic‬‭characters‬‭and‬‭numbers‬‭o n‬‭a‬‭sheet‬‭o f‬‭paper‬‭for‬‭automatic‬‭data‬
‭entry‬‭into‬‭the‬‭computer.‬‭Mostly‬‭used‬‭by‬‭insurance‬‭companies,‬‭in‬‭billing‬‭systems‬‭and‬
‭processing‬‭o f‬‭Bank‬‭Giro-forms.‬‭An‬‭Optical‬‭Character‬‭Reader‬‭is‬‭the‬‭device‬‭that‬‭is‬‭used‬
‭for‬‭automatic‬‭data‬‭entry‬‭in‬‭OCR‬‭systems.‬‭It‬‭recognises‬‭printed‬‭o r‬‭even‬‭hang‬‭written‬
‭test form input into the computer‬
‭-‬ ‭Can convert large amount of text into digital form at once‬
‭-‬ ‭Less tiresome since it is an automatic data entry method‬
‭-‬ ‭Faster in entering text into the computer‬
‭-‬ ‭Accurate in data entry‬
‭However:‬
‭-‬ ‭A lot of data entry errors can be found‬
‭-‬ ‭May not work well with tables and diagrams‬
‭-‬ ‭Do not work well with handwritten text‬

(‭ iii)‬ ‭Magnetic‬ ‭Ink‬ ‭Character‬ ‭Recognition‬ ‭(MICR):‬ ‭A‬ ‭method‬ ‭o f‬ ‭automatically‬


‭entering‬ ‭data‬ ‭into‬ ‭the‬ ‭computer‬ ‭by‬ ‭reading‬ ‭characters‬ ‭o n‬ ‭documents‬ ‭past‬ ‭a‬
‭magnetised field with iron oxide, e.g. reading numbers on the bottom of a cheque.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭142‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ dvantages‬
A ‭o f‬ ‭using‬
‭magnetic‬ ‭ink‬ ‭o n‬ ‭cheques‬
‭include:‬
‭-‬ ‭Bundles‬ ‭o f‬ ‭cheques‬
‭can‬ ‭be‬ ‭processed‬
‭very quickly.‬
‭-‬ ‭It‬ ‭is‬ ‭very‬‭difficult‬‭to‬
‭forge a cheque.‬
‭-‬ ‭The‬‭ink‬‭can‬‭be‬‭read‬
‭by‬ ‭the‬ ‭reader‬ ‭even‬
‭if‬ ‭the‬ ‭cheque‬ ‭gets‬
‭marked or dirty.‬
‭A‬ ‭Magnetic‬ ‭Ink‬
‭Character‬‭Reader‬‭is‬‭the‬
‭device‬ ‭that‬ ‭is‬ ‭used‬ ‭for‬
‭automatic‬ ‭data‬‭entry‬‭in‬
‭MICR systems‬

-‭ ‬ ‭MICR provides high level of security to data‬


‭-‬ ‭Automatic and therefore faster data entry‬
‭-‬ ‭Document can still be readable even if folded‬
‭However;‬
‭-‬ ‭Readers and printers are relatively expensive‬
‭-‬ ‭The system can only accept limited characters‬
‭-‬ ‭Very expensive data entry method‬

‭ actors To Consider When Purchasing Hardware‬


F
‭The following must be considered:‬
‭-‬ ‭Volume of data to be handled.‬
‭-‬ ‭Number of users.‬
‭-‬ ‭Location‬ ‭o f‬ ‭user‬ ‭(in‬ ‭o ne‬ ‭o ffice,‬ ‭separate‬ ‭o ffice‬ ‭o r‬ ‭in‬ ‭completely‬ ‭different‬
‭locations).‬
‭-‬ ‭Type of users (used by the public or by technical specialists).‬
‭-‬ ‭Nature of the system (batch, online, etc).‬
‭-‬ ‭Security features.‬
‭-‬ ‭Software type, etc.‬

‭ UTPUT DEVICES‬
O
‭These‬‭are‬‭devices‬‭used‬‭to‬‭display‬‭and‬‭produce‬‭data‬‭and‬‭information‬‭held‬‭inside‬‭the‬
‭computer,‬ ‭for‬ ‭example:‬ ‭screen,‬ ‭printer‬ ‭and‬ ‭graph‬ ‭plotters.‬ ‭These‬ ‭are‬ ‭described‬
‭below:‬

(‭ i)‬‭Printers:‬‭A‬‭printer‬‭is‬‭a‬‭device‬‭that‬‭is‬‭used‬‭to‬‭produce‬‭hard‬‭copies‬‭o f‬‭data‬‭held‬‭in‬
‭the‬ ‭computer.‬ ‭Hardcopy‬ ‭is‬ ‭a‬ ‭document‬ ‭printed‬ ‭o n‬ ‭paper.‬ ‭Output‬ ‭from‬ ‭the‬ ‭printer‬
‭appears‬ ‭as‬ ‭displayed‬ ‭o n‬ ‭the‬ ‭computer‬ ‭screen,‬ ‭thus‬ ‭What‬ ‭You‬ ‭See‬ ‭Is‬‭What‬‭You‬‭Get‬
‭(WYSIWYG).‬

‭Types of Printers‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭143‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ rinters can be classified into‬‭impact and non-impact printers‬‭.‬
P
‭(a)‬ ‭Impact‬ ‭Printers:‬ ‭these‬ ‭are‬ ‭printers‬ ‭whose‬ ‭write‬ ‭heads‬ ‭hit‬ ‭ink‬ ‭ribbon‬ ‭against‬
‭paper‬ ‭during‬ ‭printing,‬ ‭e.g.‬ ‭dot‬ ‭matrix‬ ‭printer,‬ ‭chain‬ ‭printer,‬ ‭daisy‬ ‭wheel,‬ ‭printer,‬ ‭drum‬
‭printer,‬ ‭etc.‬ ‭Thus,‬ ‭there‬‭is‬‭contact‬‭between‬‭the‬‭paper‬‭and‬‭the‬‭write‬‭heads‬‭during‬‭the‬
‭printing‬ ‭stage.‬ ‭Examples‬ ‭include‬ ‭drum‬ ‭printers,‬ ‭dot‬ ‭matrix‬ ‭printers,‬ ‭daisy‬ ‭wheel‬
‭printers and chain printers. Impact printers have the following advantages‬‭:‬
‭●‬ ‭they are‬‭very cheap to buy.‬
‭●‬ ‭They are cheap to repair and to maintain.‬
‭●‬ ‭They can use continuous paper.‬
‭●‬ ‭They are economic in terms of ink usage.‬

‭ owever,‬ ‭Impact‬ ‭printers‬ ‭have‬ ‭the‬


H
‭following‬ ‭disadvantages:‬ ‭They‬ ‭produce‬
‭a‬ ‭lot‬ ‭o f‬ ‭noise.‬ ‭They‬ ‭are‬ ‭very‬ ‭slow‬ ‭in‬
‭printing‬ ‭since‬ ‭most‬ ‭are‬ ‭line‬ ‭printers.‬
‭They produce poor quality printout.‬
‭dot matrix‬
‭Dot Matrix printer‬
‭-‬ ‭Produces NLQ (Near Letter Quality) output, in form of small dots.‬
‭-‬ ‭They are robust‬
‭-‬ ‭Less likely to be affected by dust‬
‭-‬ ‭Can print multi-part stationery‬
‭-‬ ‭Purchasing and running costs are very low‬

‭Weaknesses‬
‭-‬ ‭Low resolution‬
‭-‬ ‭Noisy‬
‭-‬ ‭Slow printing speed: this is because they can be character based or line based‬
‭printers.‬

‭Daisy wheel printer‬


‭-‬ ‭Uses a print wheel to produce characters‬
‭-‬ ‭Can print about 100 characters per second‬

(‭ b) Non-Impact Printers:‬‭These are printers that do‬‭not produce contact between‬


‭paper, write heads and ink cartridge during printing. Non-impact printers include:‬
‭inkjet printer, laser printer, thermal printer, etc.‬
‭Laser printers‬
‭Most of the printers use light and are therefore called laser printers.‬
‭The‬ ‭advantages‬ ‭o f‬ ‭laser‬ ‭printers‬ ‭are‬
‭as follows‬‭:‬
‭●‬ ‭They‬‭print‬‭at‬‭very‬‭high‬‭speeds‬
‭since they are page printers.‬
‭●‬ ‭They‬‭produce‬‭high‬‭quality‬‭text‬
‭and graphics.‬
‭●‬ ‭They‬ ‭produce‬ ‭less‬ ‭noise‬ ‭than‬
‭LaserJet printers‬ ‭dot-matrix‬ ‭printers‬ ‭(they‬ ‭are‬
‭quiet in their operation).‬
‭●‬ ‭Have‬ ‭paper‬ ‭trays‬ ‭both‬ ‭for‬
‭input‬ ‭and‬ ‭o utput‬ ‭and‬
‭therefore‬‭need‬‭no‬‭supervision‬
‭o nce setup.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭144‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ ‭The toner is not water-soluble‬
‭The disadvantages of laser printers are as follows:‬
‭●‬ ‭they are very expensive to buy,‬
‭●‬ ‭they are large and therefore take up a lot of desk space,‬
‭●‬ ‭they are quite complex and therefore repair bills can be very high,‬
‭●‬ ‭Multipart stationery cannot be used,‬
‭●‬ ‭Cannot be used with continuous stationery since they are page printers.‬
‭●‬ ‭Toner is toxic and therefore should be disposed of carefully after use.‬

I‭ nkjet printers‬
‭uses print head to propel droplets of ink on a sheet of paper.‬
‭Advantages:‬
‭●‬ ‭relatively high resolution‬
‭●‬ ‭Good colour production‬
‭●‬ ‭Low cost/heap to buy‬
‭●‬ ‭Usually small size‬
‭Disadvantages‬
‭●‬ ‭Slow printing speed‬
‭●‬ ‭Ink is expensive‬
‭●‬ ‭Has a water soluble ink which may be spilt‬
‭●‬ ‭Running costs are expensive‬

*‭ NB:‬ ‭-‬ ‭Printers‬ ‭can‬ ‭also‬ ‭be‬ ‭classified‬ ‭as‬ ‭page‬ ‭printers‬ ‭(these‬ ‭print‬ ‭o ne‬ ‭page‬ ‭at‬ ‭a‬
‭given‬ ‭time‬ ‭and‬ ‭are‬ ‭therefore‬ ‭faster),‬ ‭line‬ ‭printers‬ ‭(print‬ ‭o ne‬ ‭line‬ ‭at‬ ‭a‬ ‭time,‬ ‭very‬
‭slow) and character printers (print one character at a time).‬

‭Factors to consider when purchasing a printer:‬


‭-‬ ‭Price‬
‭-‬ ‭Printing speed‬
‭-‬ ‭Reliability and easiness of maintenance‬
‭-‬ ‭Print quality‬
‭-‬ ‭Range of capabilities‬
‭-‬ ‭Noise level‬
‭-‬ ‭Compatibility with computers‬

(‭ ii)‬‭Screen‬‭/‬‭Monitor:‬‭it‬‭is‬‭a‬‭television‬‭shaped‬‭device‬‭used‬‭to‬‭display‬‭contents‬‭o n‬‭the‬
‭computer‬‭as‬‭soft‬‭copy.‬‭Soft‬‭copy‬‭refers‬‭to‬‭data‬‭viewed‬‭o n‬‭the‬‭screen.‬‭The‬‭screen‬‭can‬
‭also‬ ‭be‬ ‭called‬ ‭the‬ ‭Visual‬ ‭Display‬ ‭Unit‬ ‭(VDU).‬ ‭The‬ ‭screen‬ ‭can‬ ‭differ‬ ‭in‬ ‭terms‬ ‭o f‬
‭resolution,‬‭that‬‭is‬‭low‬‭resolution‬‭screens‬‭display‬‭less‬‭number‬‭o f‬‭dots‬‭per‬‭inch‬‭o n‬‭the‬
‭computer‬‭and‬‭therefore‬‭the‬‭display‬‭will‬‭be‬‭o f‬‭poor‬‭quality.‬‭High‬‭resolution‬‭monitors‬
‭are‬ ‭needed‬ ‭mostly‬ ‭in‬ ‭graphics‬ ‭packages‬ ‭where‬ ‭colour‬ ‭and‬ ‭many‬ ‭dots‬‭per‬‭inch‬‭are‬
‭needed.‬
‭Monitors are of two main types:‬
‭-‬ ‭LCD (Liquid Crystal Display)‬
‭Relatively‬‭thin‬‭and‬‭do‬‭not‬‭use‬‭a‬‭beam‬‭o f‬‭electrons.‬‭They‬‭easily‬‭fit‬‭o n‬‭walls‬‭and‬
‭desks,‬ ‭light‬ ‭weight,‬ ‭compact‬ ‭and‬ ‭can‬ ‭fit‬ ‭o n‬ ‭laptops,‬ ‭little‬ ‭light‬ ‭is‬ ‭reflected,‬
‭absence‬ ‭o f‬ ‭flicker‬ ‭o n‬‭the‬‭screen.‬‭However,‬‭images‬‭can‬‭be‬‭viewed‬‭from‬‭fewer‬
‭angles, can display limited range of colours.‬
‭-‬ ‭CRT (Cathode Ray Tube)‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭145‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ hese‬ ‭are‬ ‭the‬ ‭o lder‬ ‭and‬ ‭bulker‬ ‭versions.‬ ‭To‬ ‭display‬ ‭content,‬ ‭an‬ ‭electric‬‭gun‬
T
‭fires‬‭a‬‭beam‬‭o f‬‭electrons‬‭from‬‭the‬‭rear‬‭o f‬‭the‬‭CRT.‬‭They‬‭are‬‭cheap,‬‭images‬‭can‬
‭be‬ ‭viewed‬ ‭from‬ ‭a‬ ‭wider‬ ‭angles,‬ ‭and‬ ‭has‬ ‭a‬ ‭wider‬ ‭range‬ ‭o f‬ ‭colour‬ ‭and‬
‭brightness.‬ ‭However,‬ ‭they‬ ‭are‬ ‭bulky‬ ‭and‬ ‭difficult‬ ‭to‬ ‭fit‬ ‭o n‬ ‭a‬ ‭desk,‬ ‭they‬ ‭are‬
‭heavy and difficult to mount on walls, and too much reflection can affect eyes.‬
‭-‬ ‭Plasma Display Panels:‬
‭Flat panel display used for television displays‬

‭Advantage of Monitors‬
‭-‬ ‭Its output is immediate and visual‬
‭-‬ ‭High speed of display‬
‭-‬ ‭No noise‬
‭-‬ ‭No wastage of paper‬
‭-‬ ‭Can display text, graphics, etc‬
‭-‬
‭Disadvantages‬
‭-‬ ‭When the display changes, the previous output is lost.‬
‭-‬ ‭Needs a separate device to produce hardcoy‬

(‭ iii)‬‭Graph‬‭Plotter:‬‭This‬‭is‬‭a‬‭device‬‭used‬‭to‬‭produce‬‭high‬‭quality‬‭drawings‬‭in‬‭various‬
‭paper‬‭sizes‬‭and‬‭is‬‭used‬‭in‬‭Computer‬‭Aided‬‭Design‬‭(CAD).‬‭A‬‭plotter‬‭can‬‭be‬‭used‬‭to‬
‭produce‬‭high‬‭quality,‬‭accurate,‬‭A3‬‭size‬‭o r‬‭bigger‬‭drawings.‬‭They‬‭are‬‭usually‬‭used‬‭for‬
‭Computer‬‭Aided‬‭Design‬‭(CAD)‬‭and‬‭Computer‬‭Aided‬‭Manufacture‬‭(CAM)‬‭applications,‬
‭such‬ ‭as‬ ‭printing‬ ‭o ut‬ ‭plans‬ ‭for‬ ‭houses‬ ‭o r‬ ‭car‬ ‭parts.‬ ‭They‬ ‭print‬ ‭sharper‬ ‭and‬ ‭more‬
‭precise drawings.‬

‭Graph plotter‬

(‭ iv) Data/data projector‬


‭An‬ ‭o utput‬ ‭device‬ ‭that‬ ‭uses‬ ‭lenses‬ ‭to‬ ‭project‬ ‭intense‬ ‭light‬ ‭o n‬ ‭the‬ ‭wall.‬ ‭Can‬ ‭be‬
‭multimedia‬ ‭projector‬‭and‬‭o ffer‬‭wider/‬‭bigger‬‭screen‬‭display‬‭o n‬‭the‬‭wall.‬‭Ideally‬‭the‬
‭surface‬ ‭should‬ ‭be‬ ‭a‬ ‭whiteboard.‬ ‭Suitable‬ ‭for‬ ‭presentations‬ ‭to‬ ‭a‬ ‭wider‬ ‭audience.‬
‭However, it is more expensive to buy and has a fragile bulb.‬

(‭ v)‬ ‭Speakers:‬ ‭produce‬ ‭sound‬ ‭from‬ ‭music‬ ‭files‬ ‭o n‬ ‭the‬ ‭computer.‬ ‭They‬ ‭are‬ ‭used‬ ‭in‬
‭conjunction with multimedia files.‬

‭(vi) Braille Printer‬‭:‬‭prints Braille which is readable‬‭to the blind people.‬

(‭ vii)‬ ‭Actuators‬‭:‬ ‭these‬ ‭are‬ ‭o utput/control‬ ‭devices‬ ‭which‬ ‭turns‬ ‭o n‬ ‭o r‬ ‭o ff‬ ‭some‬
‭devices‬ ‭in‬ ‭control‬ ‭systems.‬ ‭Some‬ ‭o f‬ ‭the‬ ‭control‬ ‭devices‬ ‭include‬ ‭electric‬ ‭heater‬
‭(supplier‬ ‭heat),‬ ‭electric‬ ‭motor‬ ‭(provide‬ ‭movement/rotation),‬ ‭motorised‬ ‭pump,‬
‭buzzers, lights, heaters, actuators, etc‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭146‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ ROCESSING DEVICE‬
P
‭A‬ ‭device‬ ‭used‬ ‭to‬ ‭convert‬‭and‬‭to‬‭manipulate‬‭data‬‭as‬‭per‬‭user‬‭requirement.‬‭The‬‭sole‬
‭processing‬ ‭device‬ ‭o f‬ ‭a‬ ‭computer‬ ‭is‬ ‭the‬ ‭processor,‬ ‭which‬ ‭is‬ ‭inside‬ ‭the‬ ‭Central‬
‭Processing‬ ‭Unit‬ ‭(CPU)‬ ‭casing.‬ ‭Processing‬ ‭involves‬‭sorting‬‭o f‬‭data,‬‭updating‬‭records,‬
‭searching certain records, adding a sequence of numbers, and others.‬
‭The processor has the following functions:‬
‭- It controls the transmission of data from input device to memory‬
‭- It processes the data and instructions held in main memory‬
‭- It controls the transmission of information from main memory to output device.‬
‭- Controls the sequence of instructions,‬
‭- Give commands to all parts of the computer,‬
‭- Fetches the next instruction to be executed‬
‭- Decodes instructions‬
‭- Executes decoded instructions‬

‭ ost‬ ‭of‬ ‭the‬ ‭computers‬ ‭have‬


M
‭micro-processors‬ ‭(small‬ ‭execution‬ ‭chip‬
‭found‬ ‭in‬ ‭microcomputers).‬ ‭With‬
‭MS-DOS‬ ‭(Microsoft‬ ‭Disk‬ ‭Operating‬
‭System)‬ ‭computer‬ ‭chips‬ ‭progressed‬
‭from‬‭286,‬‭386‬‭and‬‭486‬‭processors.‬‭Intel‬
‭Corporation‬ ‭then‬ ‭developed‬ ‭Pentium‬
‭processors,‬ ‭ranging‬ ‭from‬ ‭Pentium‬ ‭1,‬
‭Microprocessors‬ ‭Pentium‬‭2,‬‭Pentium‬‭3,‬‭Pentium‬‭4‬‭and‬‭so‬
‭on,‬ ‭with‬ ‭each‬ ‭processor‬ ‭being‬ ‭faster‬
‭then‬ ‭the‬ ‭preceding‬ ‭one.‬ ‭Pentium‬ ‭4‬
‭processors‬ ‭have‬ ‭a‬ ‭speed‬ ‭of‬ ‭about‬ ‭2.6‬
‭GHz.‬ ‭Newer‬ ‭chips‬ ‭are‬ ‭faster‬ ‭in‬
‭processing.‬

‭ he‬‭speed‬‭o f‬‭a‬‭processor‬‭determines‬‭the‬‭speed‬‭and‬‭function‬‭o f‬‭a‬‭computer.‬‭Until‬‭the‬


T
‭1980s,‬ ‭most‬ ‭computers‬ ‭had‬ ‭o ne‬ ‭processor,‬ ‭but‬ ‭recent‬ ‭o nes‬ ‭have‬ ‭two‬ ‭o r‬ ‭more‬
‭processors‬ ‭(called‬ ‭co-processors),‬ ‭those‬ ‭with‬ ‭two‬ ‭processors‬ ‭are‬ ‭called‬ ‭dual‬
‭processors.‬‭Two‬‭o r‬‭more‬‭processors‬‭share‬‭loads‬‭and‬‭therefore‬‭perform‬‭o perations‬
‭faster.‬ ‭The‬ ‭speed‬ ‭o f‬ ‭a‬ ‭computer‬ ‭is‬ ‭also‬ ‭determined‬ ‭by‬ ‭the‬ ‭c lock‬ ‭speed‬ ‭for‬ ‭each‬
‭microprocessor.‬ ‭This‬ ‭speed‬ ‭is‬‭measured‬‭in‬‭Megahertz‬‭(MHz).‬‭The‬‭general‬‭structure‬
‭o f the CPU or Processor is as illustrated below:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭147‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ he‬ ‭processor‬ ‭comprises‬ ‭o f:‬
T
‭Arithmetic‬ ‭and‬ ‭Logic‬ ‭Unit‬ ‭(ALU)‬ ‭and‬
‭the Control Unit (CU) and Registers‬
‭(a) Arithmetic and Logic Unit (ALU)‬
‭-‬ ‭Carries‬ ‭o ut‬ ‭arithmetic‬ ‭o perations‬
‭like add, subtract, divide, etc.‬
‭-Performs‬ ‭logic‬ ‭o perations,‬ ‭like‬ ‭AND,‬
‭OR,..etc‬
‭(b) Control Unit (CU)‬
‭-‬ ‭It‬ ‭coordinates‬ ‭and‬ ‭controls‬ ‭all‬
‭hardware operations,‬
‭-‬ ‭It‬ ‭carries‬ ‭o ut‬ ‭the‬ ‭Fetch-Execute‬
‭Cycle.‬
‭(c)‬ ‭Registers:‬ ‭High-speed‬ ‭storage‬
‭area‬ ‭in‬ ‭the‬ ‭CPU‬ ‭used‬ ‭to‬ ‭temporarily‬
‭hold‬ ‭small‬ ‭units‬ ‭o f‬ ‭program‬
‭instructions‬ ‭and‬ ‭data‬ ‭immediately‬
‭before,‬ ‭during‬ ‭and‬ ‭after‬ ‭execution‬‭by‬
‭the CPU.‬

‭ B‬‭:‬ ‭Memory‬ ‭(Main‬ ‭memory):‬ ‭Stores‬ ‭programs‬ ‭and‬ ‭data‬ ‭for‬ ‭programs‬ ‭currently‬
N
‭running‬‭o n‬‭the‬‭computer.‬‭Main‬‭Memory‬‭is‬‭very‬‭close‬‭to‬‭the‬‭processors‬‭and‬‭therefore‬
‭the two can coordinate their activities very fast.‬
‭-‬‭ALU‬‭o perations‬‭o n‬‭data‬‭are‬‭first‬‭loaded‬‭into‬‭the‬‭accumulator‬‭register‬‭,‬‭a‬‭memory‬
‭which stores instructions, data being processed and results of an operation.‬
‭The‬‭function‬‭o f‬‭the‬‭microprocessor‬‭is‬‭to‬‭fetch,‬‭decode‬‭and‬‭execute‬‭instructions.‬‭This‬
‭is also called the Fetch-Execute cycle.‬
‭The Fetch-Execute Cycle‬
‭Step‬ ‭1.‬ ‭Fetch‬ ‭instruction‬‭:‬ ‭In‬ ‭the‬ ‭instruction‬
‭phase,‬ ‭the‬ ‭computer’s‬ ‭control‬ ‭unit‬ ‭fetches‬ ‭the‬
‭instruction‬ ‭to‬ ‭be‬ ‭executed‬ ‭from‬ ‭memory.‬
‭Microprocessor‬ ‭gets‬ ‭software‬‭instruction‬‭telling‬‭it‬
‭what to do with data.‬
‭Step‬ ‭2.‬ ‭Decode‬ ‭instruction‬‭:‬‭Then‬‭the‬‭instruction‬
‭is‬ ‭decoded‬ ‭so‬ ‭the‬ ‭central‬ ‭processor‬ ‭can‬
‭understand‬ ‭what‬ ‭is‬ ‭to‬ ‭be‬ ‭done.‬ ‭Microprocessor‬
‭determines what the instructions mean.‬
‭Step‬ ‭3.‬‭Execute‬‭the‬‭instruction‬‭:‬‭In‬‭the‬‭execution‬
‭phase,‬ ‭the‬ ‭ALU‬ ‭does‬ ‭what‬ ‭it‬ ‭is‬ ‭instructed‬ ‭to‬ ‭do,‬
‭making‬ ‭either‬ ‭an‬ ‭arithmetic‬ ‭computation‬ ‭o r‬ ‭a‬
‭The Fetch-Execute Cycle‬ ‭logical‬ ‭comparison.‬ ‭Microprocessor‬ ‭performs‬ ‭the‬
‭instruction.‬
‭Step‬ ‭4.‬ ‭Store‬ ‭results‬‭:‬‭Then‬‭the‬‭results‬‭are‬‭stored‬
‭in the registers or in memory.‬
‭Step‬ ‭3‬ ‭&‬ ‭4‬ ‭are‬ ‭c alled‬ ‭the‬ ‭execution‬‭phase‬‭.‬‭The‬
‭time‬ ‭it‬ ‭takes‬ ‭to‬ ‭complete‬ ‭the‬ ‭execution‬ ‭phase‬ ‭is‬
‭called the EXECUTION TIME (E-time).‬
‭After‬ ‭both‬ ‭phases‬ ‭have‬ ‭been‬ ‭completed‬ ‭for‬ ‭o ne‬
‭instruction,‬ ‭they‬ ‭are‬ ‭again‬ ‭performed‬ ‭for‬ ‭the‬
‭second instruction, and so on.‬

‭Buses‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭148‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ A ‭ ‬ ‭bus‬ ‭is‬ ‭a‬ ‭pathway‬ ‭through‬ ‭which‬ ‭data‬‭and‬‭signals‬‭are‬‭transferred‬‭from‬‭o ne‬
‭device to another in the computer system.‬
‭●‬ ‭They‬ ‭are‬ ‭a‬ ‭set‬ ‭o f‬ ‭parallel‬ ‭wires‬ ‭connecting‬ ‭two‬ ‭o r‬ ‭more‬ ‭components‬ ‭o f‬ ‭the‬
‭computer.‬
‭●‬ ‭Buses can be internal or external.‬
‭●‬ ‭Buses‬ ‭can‬ ‭be‬ ‭generally‬ ‭referred‬ ‭to‬ ‭as‬ ‭system‬ ‭bus‬ ‭and‬ ‭this‬ ‭connect‬ ‭the‬ ‭CPU,‬
‭memory and I/O devices.‬
‭●‬ ‭Each‬ ‭bus‬ ‭is‬ ‭a‬ ‭shared‬ ‭transmission‬ ‭medium,‬ ‭so‬ ‭that‬ ‭o nly‬ ‭o ne‬ ‭device‬ ‭can‬
‭transmit along a bus at any one time.‬
‭●‬ ‭Multiple devices can be connected to the same bus‬
‭●‬ ‭The main types of buses are:‬
‭-‬‭Data bus‬‭:‬
‭●‬ ‭Used for carrying data from memory to the processor and between I/O ports.‬
‭●‬ ‭Comprises of either 8, 16, 32 or 64 separate parallel lines‬
‭●‬ ‭Provide a bi-directional path for data and instruction’s between computer‬
‭components. This means that the CPU can read data from memory and input‬
‭ports and also send data to memory and output ports.‬
‭●‬ ‭The width of the bus determines the overall system performance. For‬
‭example, if the data bus is 8 bits wide, and each instruction is 16 bits long,‬
‭then the processor must access the main memory twice during each‬
‭instruction cycle‬

‭-‬‭Address bus‬‭:‬
‭●‬ ‭Used‬ ‭for‬ ‭transferring‬ ‭memory‬ ‭addresses‬ ‭from‬ ‭the‬ ‭processor‬ ‭when‬ ‭it‬ ‭is‬
‭accessing main memory‬
‭●‬ ‭They are used to access memory during the read or write process‬
‭●‬ ‭The‬ ‭width‬ ‭o f‬ ‭the‬ ‭address‬ ‭bus‬ ‭determines‬ ‭the‬ ‭maximum‬ ‭possible‬ ‭memory‬
‭capacity of the computer.‬
‭●‬ ‭This‬‭a‬‭uni-directional‬‭bus‬‭(one‬‭way).‬‭The‬‭address‬‭is‬‭send‬‭from‬‭CPU‬‭to‬‭memory‬
‭and I/O ports only.‬

-‭ ‬‭Control bus‬‭:‬
‭●‬ ‭The‬ ‭purpose‬ ‭o f‬ ‭the‬ ‭control‬ ‭bus‬ ‭is‬ ‭to‬ ‭transmit‬ ‭command,‬ ‭timing‬ ‭and‬ ‭specific‬
‭status‬ ‭information‬ ‭between‬ ‭system‬ ‭components.‬ ‭Timing‬ ‭signals‬ ‭indicate‬ ‭the‬
‭validity‬‭o f‬‭data‬‭and‬‭address‬‭information.‬‭Command‬‭signals‬‭specify‬‭o perations‬‭to‬
‭be‬‭performed.‬‭Specific‬‭status‬‭signals‬‭indicate‬‭the‬‭state‬‭o f‬‭a‬‭data‬‭transfer‬‭request,‬
‭o r the status of request by a components to gain control of the system bus‬
‭●‬ ‭This‬ ‭is‬ ‭a‬ ‭bi-directional‬ ‭bus‬ ‭used‬ ‭for‬ ‭carrying‬ ‭control‬ ‭signals‬ ‭(Signals‬ ‭can‬ ‭be‬
‭transferred in both directions).‬
‭●‬ ‭They carry signals to enable outputs of addressed port and memory devices‬
‭●‬ ‭Control signals regulate activities on the bus.‬
‭●‬ ‭Control‬ ‭buses‬ ‭transmit‬ ‭command,‬ ‭timing‬ ‭and‬ ‭status‬ ‭information‬ ‭between‬
‭computer components.‬

‭ an‬
F
‭A fan is used to cool the processor. It blows away hot air to that the processor‬
‭remains cool.‬

‭ TORAGE MEDIA‬
S
‭These are devices used to store data and programs for future use.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭149‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ ethods of storing data:‬


M
‭Refers‬ ‭to‬ ‭ways‬ ‭files‬ ‭and‬ ‭records‬ ‭are‬ ‭stored‬ ‭o n‬ ‭a‬ ‭storage‬ ‭media,‬ ‭that‬ ‭is‬ ‭the‬
‭arrangement of data. These include:‬
‭-‬ ‭Serial‬ ‭Storage:‬ ‭Data‬ ‭is‬ ‭stored‬ ‭as‬ ‭they‬ ‭o ccur‬ ‭without‬ ‭following‬ ‭any‬ ‭o rder,‬ ‭as‬ ‭o n‬
‭magnetic tapes.‬
‭-‬‭Sequential‬‭Storage:‬‭Data‬‭is‬‭stored‬‭using‬‭a‬‭predefined‬‭o rder,‬‭either‬‭in‬‭ascending‬‭o r‬
‭descending order of a key field, as occurs on magnetic tapes.‬
‭-‬ ‭Direct‬ ‭(Random)‬ ‭Storage:‬ ‭Data‬ ‭is‬ ‭stored‬ ‭in‬ ‭a‬ ‭random‬‭way‬‭using‬‭an‬‭index,‬‭as‬‭o n‬
‭diskettes, hard disks, CD-ROMs, etc.‬

‭ ethods of Accessing Data‬


M
‭These are methods used to retrieve data held on storage media. These include:‬
‭(1)‬ ‭Serial‬ ‭Access:‬ ‭Data‬ ‭is‬ ‭retrieved‬ ‭in‬ ‭the‬‭o rder‬‭it‬‭is‬‭stored,‬‭reading‬‭files‬‭o ne‬‭after‬
‭another‬‭from‬‭the‬‭first‬‭until‬‭the‬‭required‬‭data‬‭is‬‭found‬‭in‬‭an‬‭unsorted‬‭list‬‭o f‬‭records.‬
‭It‬‭is‬‭very‬‭slow‬‭and‬‭time‬‭wasting‬‭in‬‭accessing‬‭records‬‭far‬‭away‬‭from‬‭the‬‭first‬‭position‬
‭but is faster to access data at first position of the disk. It is used in magnetic tapes.‬
‭(2)‬‭Sequential‬‭Access:‬‭Data‬‭is‬‭retrieved‬‭in‬‭the‬‭o rder‬‭stored,‬‭from‬‭the‬‭first‬‭until‬‭the‬
‭required‬ ‭data‬ ‭is‬ ‭found,‬ ‭using‬ ‭a‬ ‭key‬ ‭field‬ ‭in‬ ‭a‬ ‭sorted‬ ‭list‬ ‭o f‬ ‭records,‬ ‭as‬ ‭in‬ ‭magnetic‬
‭tapes.‬
‭(3)‬ ‭Direct‬ ‭(Random)‬ ‭Access:‬‭Data‬‭is‬‭retrieved‬‭by‬‭going‬‭directly‬‭to‬‭the‬‭needed‬‭file,‬
‭as‬‭applied‬‭in‬‭hard‬‭disks,‬‭diskettes,‬‭CD-ROM,‬‭DVD-ROM,‬‭Memory‬‭Sticks,‬‭etc.‬‭It‬‭is‬‭a‬‭very‬
‭fast method of accessing data.‬

‭ torage Capacity‬
S
‭Refers‬ ‭to‬ ‭the‬ ‭amount‬ ‭(volume)‬ ‭o f‬ ‭data‬ ‭a‬ ‭device‬ ‭can‬ ‭store.‬ ‭The‬ ‭following‬ ‭storage‬
‭measurements can be used:‬
‭Bit‬‭: The smallest unit of data a computer can store,‬‭either a 1 or a 0.‬
‭Nibble‬‭: refers to half a byte, that is, a group of‬‭4 bits.‬
‭Byte:‬ ‭a‬ ‭group‬ ‭o f‬ ‭8‬ ‭bits‬ ‭representing‬ ‭a‬ ‭character.‬ ‭For‬ ‭example,‬ ‭the‬ ‭letter‬ ‭C‬ ‭is‬
‭represented by the byte 01000011.‬

‭Size‬ ‭Equal to‬

‭8 bits‬ ‭1 byte‬

‭1024 bytes‬ ‭1 kilobyte‬

‭1024 kilobytes‬ ‭1 megabyte‬

‭1024 megabytes‬ ‭1 gigabyte‬

‭1024 gigabytes‬ ‭1 terabyte‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭150‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ ilobyte (KB):‬‭this refers to 1024 bytes.‬


K
‭Megabyte (MB):‬‭1 MB is equivalent to 1 048 576 bytes.‬
‭Gigabytes (GB):‬‭1024 megabytes (approximately 1 billion‬‭bytes)‬
‭Terabytes (TB):‬‭refers to‬‭1 099 511 627 776 bytes‬‭(approximately 1 024 GB)‬

*‭ ‬‭NB‬‭:-‬‭Formatting‬‭(initialising)‬‭a‬‭disk:‬‭this‬‭is‬‭the‬‭process‬‭o f‬‭creating‬‭new‬‭tracks‬‭and‬
‭sectors‬ ‭o n‬ ‭the‬ ‭disk‬ ‭that‬ ‭will‬ ‭be‬ ‭used‬ ‭in‬ ‭storing‬ ‭data.‬ ‭When‬ ‭a‬ ‭disk‬ ‭is‬ ‭formatted,‬
‭existing‬‭tracks‬‭and‬‭sectors‬‭are‬‭destroyed,‬‭including‬‭the‬‭data‬‭stored‬‭o n‬‭them,‬‭and‬‭new‬
‭o nes‬ ‭are‬ ‭created.‬ ‭After‬ ‭formatting,‬ ‭the‬ ‭disk‬ ‭will‬ ‭be‬ ‭blank.‬ ‭Formatting‬‭is‬‭done‬‭using‬
‭the‬‭FAT‬‭o r‬‭the‬‭NTFS‬‭file‬‭system.‬‭FAT‬‭(or‬‭FAT16)‬‭stands‬‭for‬‭File‬‭Allocation‬‭Table‬‭:-‬‭It‬
‭is‬ ‭a‬ ‭file‬ ‭system‬ ‭used‬ ‭by‬ ‭MS-DOS‬ ‭and‬ ‭Windows‬ ‭o perating‬ ‭systems‬ ‭to‬ ‭o rganise‬ ‭and‬
‭manage‬‭files.‬‭It‬‭is‬‭a‬‭data‬‭structure‬‭that‬‭Windows‬‭creates‬‭when‬‭you‬‭format‬‭a‬‭volume‬
‭by‬‭using‬‭FAT‬‭o r‬‭FAT32‬‭file‬‭system.‬‭Windows‬‭will‬‭store‬‭information‬‭about‬‭each‬‭file‬‭in‬
‭a‬‭FAT‬‭so‬‭that‬‭it‬‭can‬‭retrieve‬‭the‬‭file‬‭later.‬‭FAT‬‭uses‬‭16‬‭bit‬‭filing‬‭system.‬‭FAT32‬‭uses‬‭32‬
‭bit‬ ‭values‬ ‭and‬ ‭uses‬ ‭drive‬ ‭space‬ ‭more‬ ‭efficiently‬ ‭and‬ ‭supports‬‭drives‬‭o f‬‭up‬‭to‬‭2‬‭TB.‬
‭Storage media is grouped in‬‭primary storage‬‭and‬‭secondary‬‭storage‬‭:‬

‭ .‬ ‭PRIMARY‬ ‭STORAGE‬ ‭(MAIN‬ ‭MEMORY,‬ ‭MAIN‬ ‭STORE,‬ ‭IMMEDIATE‬ ‭ACCESS‬


1
‭MEMORY, INTERNAL STORAGE)‬
‭Refers‬‭to‬‭a‬‭group‬‭o f‬‭chips‬‭inside‬‭the‬‭processing‬‭unit‬‭where‬‭data‬‭is‬‭held‬‭temporarily‬
‭whilst‬ ‭processing‬ ‭takes‬ ‭place.‬ ‭Main‬ ‭memory‬ ‭is‬ ‭very‬‭fast‬‭and‬‭reliable‬‭to‬‭use.‬‭Data‬‭is‬
‭instantly accessed due to its proximity to the processor.‬
‭Main storage is used for:‬
‭-‬ ‭Storage of instructions waiting to be obeyed by the computer.‬
‭-‬ ‭Storage of programs currently being run on the computer.‬
‭-‬ ‭Storage of data currently being processed.‬
‭-‬ ‭Storage of input data before processing.‬
‭-‬ ‭Storage of output data, waiting to be saved or output to the printer.‬
‭-‬ ‭Acts as a working area for data currently being processed.‬
‭Main memory is grouped in to‬‭RAM‬‭and‬‭ROM‬‭.‬

(‭ a) RAM (Random Access Memory):‬


‭A‬ ‭memory‬ ‭chip‬ ‭inside‬ ‭CPU‬ ‭casing‬ ‭used‬ ‭to‬ ‭store‬ ‭data‬ ‭and‬ ‭programs‬ ‭temporarily‬
‭during processing.‬

‭RAM Chips‬

‭The uses of RAM are:‬


‭-‬ ‭To store programs currently running on the computer.‬
‭-‬ ‭Storage of data being processed in the computer.‬
‭-‬ ‭Storage of output data.‬
‭-‬ ‭Acts as a working area for data and programs.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭151‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ AM‬ ‭is‬ ‭volatile‬‭,‬ ‭which‬ ‭means‬ ‭that‬ ‭it‬ ‭loses‬ ‭its‬‭contents‬‭when‬‭power‬‭is‬‭switched‬‭o ff.‬
R
‭RAM‬ ‭is‬ ‭in‬ ‭two‬ ‭forms;‬ ‭that‬ ‭is,‬ ‭dynamic‬ ‭and‬ ‭static‬ ‭RAM.‬ ‭Static‬ ‭RAM‬ ‭is‬ ‭a‬ ‭Random‬
‭Access‬ ‭Memory‬ ‭chip‬ ‭whose‬ ‭contents‬ ‭do‬ ‭not‬ ‭change‬ ‭as‬ ‭long‬ ‭as‬ ‭there‬‭is‬‭continuous‬
‭power‬‭supply.‬‭Dynamic‬‭RAM‬‭is‬‭Random‬‭Access‬‭Memory‬‭chip‬‭whose‬‭contents‬‭can‬‭be‬
‭lost‬‭even‬‭if‬‭there‬‭is‬‭continuous‬‭power‬‭supply.‬‭Dynamic‬‭RAM‬‭needs‬‭to‬‭be‬‭refreshed‬‭to‬
‭prevent loss of data.‬
‭The‬‭size‬‭o f‬‭RAM‬‭also‬‭affects‬‭the‬‭speed‬‭o f‬‭o peration‬‭o f‬‭a‬‭computer‬‭and‬‭the‬‭number‬‭o f‬
‭programs‬‭that‬‭can‬‭be‬‭run‬‭o n‬‭it.‬‭RAM‬‭size‬‭can‬‭be‬‭16‬‭MB,‬‭32‬‭MB,‬‭64‬‭MB,‬‭126‬‭MB,‬‭256‬
‭MB,‬ ‭448‬ ‭MB,‬ ‭1‬ ‭GB,‬ ‭etc.‬ ‭The‬ ‭bigger‬ ‭the‬ ‭RAM‬ ‭size,‬ ‭the‬ ‭better‬ ‭the‬ ‭efficiency‬ ‭o f‬ ‭the‬
‭computer and the bigger the number of programs it can run at a given time.‬

(‭ b)‬ ‭ROM‬ ‭(Read‬ ‭Only‬ ‭Memory):‬ ‭ROM‬ ‭is‬ ‭a‬ ‭semi-conductor‬ ‭circuit‬ ‭(chip)‬ ‭whose‬
‭contents‬‭can‬‭o nly‬‭be‬‭read‬‭from‬‭and‬‭cannot‬‭be‬‭erased‬‭o r‬‭modified.‬‭ROM‬‭contents‬‭are‬
‭fixed‬‭during‬‭manufacturing,‬‭that‬‭is,‬‭they‬‭are‬‭hard‬‭–‬‭wired.‬‭These‬‭contents‬‭can‬‭o nly‬‭be‬
‭read from and cannot be modified.‬
‭The uses of ROM are:‬
‭-‬ ‭Stores‬ ‭the‬ ‭Basic‬ ‭Input-Output‬ ‭System‬ ‭(BIOS-refers‬ ‭to‬ ‭software‬ ‭that‬ ‭test‬
‭hardware‬ ‭at‬ ‭start-up,‬ ‭starts‬ ‭the‬ ‭o perating‬ ‭system‬ ‭and‬ ‭support‬ ‭data‬ ‭transfer‬
‭between devices.) of the computer.‬
‭-‬ ‭Stores‬ ‭control‬ ‭programs‬ ‭for‬ ‭the‬ ‭o peration‬ ‭o f‬ ‭the‬ ‭computer‬ ‭and‬ ‭its‬
‭peripherals.‬
‭-‬ ‭Stores translator programs.‬
‭ROM is grouped into:‬
‭Programmable‬ ‭Read‬ ‭Only‬ ‭Memory‬ ‭(PROM):‬ ‭This‬ ‭is‬ ‭a‬ ‭ROM‬ ‭chip‬ ‭whose‬ ‭contents‬
‭can be changed but only once. It is re-programmable only once.‬
‭Erasable‬ ‭Programmable‬ ‭Read‬ ‭Only‬ ‭Memory‬ ‭(EPROM):‬ ‭This‬ ‭is‬ ‭a‬ ‭Read‬ ‭Only‬
‭Memory chip whose contents can be erased and modified several times.‬
‭Electrically‬ ‭Erasable‬ ‭Read‬ ‭Only‬‭Memory‬‭(EEPROM):‬‭This‬‭is‬‭a‬‭Read‬‭Only‬‭Memory‬
‭chip whose contents can be erased and modified several times using electricity.‬
‭*‬‭NB‬‭:-‬ ‭Firmware‬ ‭(microcode)‬‭:-refers‬ ‭to‬ ‭coded‬ ‭instructions‬ ‭that‬ ‭are‬ ‭stored‬
‭permanently in read-only memory, for example BIOS.‬

‭ econdary Storage (Backing Storage/Auxiliary Storage/External Storage)‬


S
‭These‬ ‭are‬ ‭devices‬ ‭used‬ ‭to‬ ‭store‬ ‭data‬ ‭and‬ ‭programs‬ ‭for‬ ‭future‬ ‭use‬ ‭o utside‬ ‭the‬
‭computer‬‭systems.‬‭It‬‭is‬‭a‬‭supplement‬‭to‬‭main‬‭storage.‬‭Backing‬‭storage‬‭is‬‭non-volatile.‬
‭Backing storage is grouped into‬‭magnetic storage,‬‭solid state and optical storage.‬

‭ agnetic Storage‬
M
‭These‬ ‭store‬ ‭data‬ ‭o n‬ ‭magnetised‬ ‭field‬ ‭o f‬ ‭iron‬ ‭oxide‬ ‭and‬ ‭include‬‭magnetic‬‭tapes,‬‭zip‬
‭drives, diskettes, hard drives and flash drives.‬

(‭ a)‬‭Magnetic‬‭Tapes:‬‭They‬‭are‬‭similar‬‭to‬‭a‬‭normal‬‭cassette‬‭tape‬‭in‬‭shape.‬‭They‬‭store‬
‭data‬ ‭in‬ ‭serial‬ ‭and‬ ‭sequential‬ ‭o rder.‬ ‭They‬ ‭are‬ ‭mostly‬ ‭used‬ ‭to‬ ‭backup‬ ‭data.‬ ‭Their‬
‭storage‬ ‭capacity‬ ‭can‬ ‭be‬ ‭up‬ ‭to‬ ‭20‬ ‭GB.‬ ‭Data‬ ‭is‬ ‭also‬ ‭accessed‬ ‭in‬ ‭serial‬ ‭o r‬ ‭sequential‬
‭o rder. They can be used as off-line storage media.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭152‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

‭ agnetic‬ ‭tapes‬ ‭have‬ ‭the‬ ‭following‬


M
‭advantages:‬
‭●‬ ‭Data‬ ‭can‬ ‭be‬ ‭arranged‬ ‭in‬ ‭an‬ ‭o rdered‬
‭sequence.‬
‭●‬ ‭They‬ ‭are‬ ‭re-usable,‬ ‭that‬ ‭is‬ ‭can‬ ‭be‬
‭overwritten several times.‬
‭●‬ ‭Suitable‬ ‭for‬ ‭high‬ ‭hit‬ ‭rate‬ ‭processing‬
‭systems‬ ‭like‬ ‭payroll,‬ ‭billing‬ ‭systems,‬
‭etc.‬
‭Magnetic tape‬ ‭●‬ ‭They‬ ‭last‬ ‭for‬ ‭a‬ ‭very‬ ‭long‬ ‭period‬ ‭o f‬
‭time,‬ ‭and‬ ‭thus‬ ‭can‬ ‭be‬ ‭used‬ ‭to‬ ‭keep‬
‭historical records.‬
‭●‬ ‭They are very cheap to buy.‬
‭●‬ ‭They‬‭store‬‭very‬‭large‬‭volumes‬‭o f‬‭data,‬
‭o f up to 20 GB.‬
‭●‬ ‭They‬ ‭are‬ ‭small,‬ ‭robust,‬ ‭and‬ ‭portable‬
‭and provide low cost storage per‬‭GB‬‭.‬

‭However, they have the following disadvantages:‬


‭●‬ ‭It‬ ‭takes‬ ‭too‬ ‭long‬ ‭to‬ ‭find‬ ‭(search‬ ‭for)‬ ‭a‬ ‭needed‬ ‭record‬ ‭in‬ ‭a‬ ‭long‬ ‭list‬ ‭o f‬ ‭data‬
‭records. It is very difficult to update record held in a magnetic tape.‬
‭●‬ ‭It takes too long to update records, time wasting.‬
‭●‬ ‭They are prone to humid (moist) conditions.‬
‭●‬ ‭They are very slow to write to and read fro‬‭m‬

(‭ b)‬ ‭Hard‬ ‭Disk‬ ‭(Hard‬ ‭Drive):‬ ‭These‬ ‭are‬ ‭disks‬ ‭used‬ ‭to‬ ‭store‬ ‭large‬ ‭volumes‬ ‭o f‬‭data‬
‭and‬‭programs,‬‭including‬‭o perating‬‭systems‬‭and‬‭are‬‭resident‬‭in‬‭the‬‭CPU‬‭casing.‬‭Data‬
‭is‬‭stored‬‭o n‬‭tracks‬‭in‬‭a‬‭random‬‭way‬‭and‬‭data‬‭retrieval‬‭is‬‭in‬‭a‬‭random‬‭way.‬‭Hard‬‭disks‬
‭can‬‭store‬‭data‬‭o f‬‭up‬‭to‬‭300‬‭GB,‬‭but‬‭ranges‬‭from‬‭2‬‭GB,‬‭8‬‭GB,‬‭20‬‭GB,‬‭40‬‭GB,‬‭80‬‭GB,‬‭120‬
‭GB,‬ ‭etc.‬ ‭a‬ ‭hard‬ ‭disk‬ ‭can‬ ‭be‬ ‭internal‬ ‭o r‬ ‭external.‬ ‭External‬ ‭hard‬ ‭disks‬ ‭have‬ ‭a‬ ‭larger‬
‭storge capacity and can be used to back-up the system‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭153‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ses of Hard Disk:‬
U
‭●‬ ‭Creating backups for data.‬
‭●‬ ‭Storing‬ ‭communication‬ ‭and‬ ‭applications‬
‭software.‬
‭●‬ ‭Storing‬ ‭o f‬ ‭the‬ ‭o perating‬ ‭system‬ ‭from‬
‭which the computer will boot.‬
‭●‬ ‭Transferring‬ ‭large‬ ‭volumes‬‭o f‬‭data‬‭from‬
‭o ne computer to another.‬
‭Hard disks have the following advantages:‬
‭●‬ ‭It‬‭is‬‭easier‬‭to‬‭access‬‭data‬‭stored‬‭o n‬‭hard‬
‭disks.‬
‭●‬ ‭They‬ ‭have‬ ‭a‬ ‭long‬ ‭life‬ ‭span,‬ ‭o f‬ ‭about‬ ‭5‬
‭years or more.‬
‭●‬ ‭Provides direct access to data.‬
‭●‬ ‭It‬ ‭is‬ ‭easier‬ ‭and‬ ‭faster‬ ‭to‬ ‭update‬‭data‬‭o n‬
‭ ard‬ ‭disc:‬ ‭Internal‬ ‭Structure(Above)‬ ‭&‬
H
‭hard disks.‬
‭External Appearance (Below)‬ ‭●‬ ‭They are more robust.‬
‭●‬ ‭Have‬ ‭large‬ ‭storage‬ ‭capacity,‬ ‭about‬ ‭300‬
‭GB or more.‬
‭●‬ ‭Very reliable to use‬

‭Disadvantages of Hard Disks:‬


‭●‬ ‭Are‬ ‭fixed‬ ‭inside‬ ‭the‬ ‭CPU‬ ‭casing‬ ‭and‬ ‭therefore‬ ‭cannot‬ ‭be‬ ‭repaired‬ ‭o nce‬
‭damaged.‬
‭●‬ ‭All data can be lost if it crashes‬
‭●‬ ‭Can easily crush if computer is not switched off properly.‬
‭●‬ ‭They are expensive to buy.‬

(‭ c)‬ ‭Diskette‬ ‭(Floppy‬ ‭Disk):‬ ‭A‬ ‭3.5‬ ‭inch‬ ‭and‬‭plastic‬‭magnetic‬‭disk‬‭enclosed‬‭in‬‭a‬‭stiff‬


‭envelope‬ ‭with‬ ‭a‬ ‭radial‬ ‭slit;‬ ‭used‬ ‭to‬ ‭store‬ ‭data‬ ‭o r‬ ‭programs.‬ ‭They‬ ‭have‬ ‭a‬ ‭storage‬
‭capacity‬ ‭o f‬ ‭1.44‬ ‭MB.‬ ‭They‬ ‭are‬ ‭used‬ ‭as‬ ‭backing‬ ‭storage‬ ‭for‬ ‭small‬ ‭volumes‬ ‭o f‬ ‭data.‬
‭Data‬ ‭is‬ ‭stored‬ ‭o n‬ ‭tracks‬ ‭in‬ ‭a‬ ‭random‬ ‭way.‬ ‭Direct‬ ‭access‬ ‭to‬ ‭data‬ ‭is‬ ‭provided.‬ ‭Its‬
‭features are shown below:‬
‭Diagram of a Diskette:‬
‭Notes on Diagram‬
‭Rigid‬‭plastic‬‭c ase‬‭:‬‭-‬‭protects‬‭the‬‭disk‬‭inside‬‭from‬
‭damage.‬
‭Write‬ ‭protect‬ ‭Window‬‭:‬ ‭When‬ ‭it‬ ‭is‬ ‭o pen,‬ ‭data‬
‭cannot‬‭be‬‭written‬‭o n‬‭disk,‬‭unless‬‭it‬‭is‬‭closed.‬‭It‬‭is‬‭a‬
‭method‬ ‭o f‬ ‭preventing‬ ‭data‬ ‭o n‬ ‭disk‬ ‭from‬ ‭being‬
‭modified.‬
‭Disk‬ ‭Label‬‭:‬ ‭this‬ ‭is‬ ‭where‬ ‭the‬ ‭user‬ ‭writes‬ ‭some‬
‭information,‬ ‭for‬ ‭example‬ ‭his/her‬ ‭name,‬ ‭disk‬
‭contents, etc.‬
‭High‬ ‭Density‬ ‭Window‬‭:‬‭-‬‭indicates‬‭that‬‭a‬‭disk‬‭can‬
‭store‬ ‭data‬ ‭o n‬ ‭two‬ ‭sides,‬ ‭thus‬ ‭allowing‬ ‭more‬ ‭data‬
‭to‬ ‭be‬ ‭stored‬ ‭o n‬ ‭them.‬ ‭1.44‬ ‭MB‬ ‭disks‬ ‭are‬ ‭double‬
‭density disks.‬

‭Uses of diskettes are:‬


‭●‬ ‭Creating backups for small amounts of data.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭154‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭ ‬ ‭Transferring small amounts of data from one computer to another.‬

‭●‬ ‭Booting up the computer in case of system failure, for system recovery.‬
‭●‬ ‭Storage of small programs and data.‬
‭Advantages of Diskettes:‬
‭●‬ ‭They are portable (easy to carry around as they can fit in a shirt pocket.).‬
‭●‬ ‭Conceals less electricity.‬
‭●‬ ‭Most are high Double Density Diskettes.‬

‭Disadvantages of Diskettes:‬
‭●‬ ‭have very short life span (not durable).‬
‭●‬ ‭Can be affected by humid conditions.‬
‭●‬ ‭Can easily be affected by dusty conditions.‬
‭●‬ ‭Can easily be damaged if placed close to the screen for a long time.‬
‭●‬ ‭Takes long to read data into memory than from a hard disk.‬
‭●‬ ‭Hold very small amount of data, 1.44 MB.‬

‭Caring for diskettes:‬


‭●‬ ‭Do not place them near magnetised field or near the computer screen.‬
‭●‬ ‭Keep them free from dust.‬
‭●‬ ‭Keep of dry place.‬
‭●‬ ‭Do not expose them to direct sunlight.‬

(‭ d)‬ ‭Zip‬ ‭Drives‬‭:‬ ‭Similar‬ ‭to‬ ‭diskettes‬ ‭in‬ ‭shape‬ ‭but‬ ‭does‬ ‭not‬ ‭flop.‬ ‭Data‬ ‭is‬ ‭stored‬ ‭in‬ ‭a‬
‭random way. Data is accessed in a random way. Storage capacity is 100 MB.‬
‭Advantages of Zip Drives:‬
‭●‬ ‭They‬ ‭are‬ ‭portable‬ ‭(easy‬ ‭to‬ ‭carry‬
‭around‬ ‭as‬ ‭they‬ ‭can‬ ‭fit‬ ‭in‬ ‭a‬ ‭shirt‬
‭pocket.).‬
‭●‬ ‭Conceals less electricity.‬
‭●‬ ‭Relatively cheap‬
‭●‬ ‭Most‬ ‭are‬ ‭high‬ ‭Double‬ ‭Density‬
‭drives.‬
‭●‬ ‭More durable than diskettes‬
‭●‬ ‭Good for archiving data‬
‭Disadvantages of Zip Drives:‬
‭●‬ ‭Hold‬ ‭small‬ ‭amount‬ ‭o f‬ ‭data‬ ‭o f‬
‭about 100 MB.‬
‭●‬ ‭Not as compact as USB flash drive‬
‭●‬ ‭Slow data transfer rates‬
‭Zip drive‬

‭Solid State Storage Media‬


‭ hese‬ ‭are‬ ‭storage‬ ‭devices‬ ‭with‬ ‭no‬ ‭movable‬ ‭parts.‬ ‭They‬ ‭are‬ ‭based‬ ‭o n‬ ‭electronic‬
T
‭c ircuits‬ ‭with‬‭no‬‭moving‬‭parts‬‭(no‬‭reels‬‭o f‬‭tape,‬‭no‬‭spinning‬‭discs,‬‭no‬‭laser‬‭beams,‬
‭etc.).‬‭Solid‬‭state‬‭devices‬‭use‬‭a‬‭special‬‭type‬‭o f‬‭memory‬‭called‬‭flash‬‭memory.‬‭Examples‬
‭o f‬ ‭solid‬ ‭state‬ ‭devices‬ ‭include‬ ‭flash‬ ‭memory,‬ ‭USB‬ ‭memory‬ ‭stick,‬ ‭memory‬ ‭cards,‬ ‭etc.‬
‭solid‬ ‭state‬‭devices‬‭takes‬‭the‬‭form‬‭o f‬‭solid‬‭state‬‭drives‬‭(‬‭SSD‬‭),‬‭solid‬‭state‬‭cards‬‭(‬‭SSC‬‭),‬
‭solid state modules (‬‭SSM‬‭), etc‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭155‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭(a) Flash Memory‬
‭ lash memory is a type of‬‭EEPROM‬‭. Flash memory is‬‭non-volatile‬‭(like ROM) but‬
F
‭the data stored in it can also be‬‭erased‬‭o r‬‭c hanged‬‭(like RAM). Flash memory can be‬
‭found in many data storage devices. You might wonder why, since flash memory is‬
‭non-volatile, normal computers don’t use it instead of RAM. If they did we would‬
‭have computers that you could turn off, turn back on again and no data would be‬
‭lost – it would be great‬
‭The reason is speed – saving data to flash memory is very slow compared to saving it‬
‭to RAM. If a computer were to use flash memory as a replacement for RAM it would‬
‭run very slowly.‬
‭However some portable computers are starting to use flash memory (in the form of‬
‭solid-state ‘discs’ as a replacement for hard-drives. No moving parts mean less to go‬
‭wrong and longer battery life.‬

‭(b) Memory Cards‬


‭ any of our digital devices (‬‭c ameras‬‭,‬‭mobile phones‬‭,‬‭MP3 players‬‭, etc.) require‬
M
‭compact‬‭,‬‭non-volatile‬‭data storage. Flash memory cards‬‭provide this and come in a‬
‭variety of shapes and sizes.‬
‭One of the most common formats used by digital cameras is the SD Card. The cards‬
‭store the digital images taken by the camera. Mobile phones contain a Subscriber‬
‭Identity Module (‬‭SIM‬‭) card that contains the phone’s‬‭number, the phonebook‬
‭numbers, text messages, etc. Many phones also have extra memory cards to store‬
‭music, video, photos, etc. (e.g Tiny Micro-SD cards).‬

‭ emory Cards‬‭: memory card is like a portable hard‬‭disk that fits into personal‬
M
‭computer card slot.‬

‭ hey‬ ‭o ffer‬ ‭direct‬ ‭access‬ ‭to‬ ‭data,‬ ‭are‬


T
‭portable,‬ ‭can‬ ‭fit‬ ‭even‬ ‭o n‬ ‭tablet‬
‭computers‬ ‭like‬ ‭cell‬ ‭phones,‬ ‭have‬ ‭large‬
‭storage capacity of up to 8 GB.‬
‭They‬ ‭can‬ ‭get‬ ‭lost‬ ‭easily.‬ ‭Virus‬ ‭spread‬
‭quickly through them.‬
‭Memory cards‬

‭(c) Smart Cards‬


‭ any credit cards (e.g. ‘‬‭c hip-and-pin‬‭’ cards), door‬‭entry cards, satellite TV cards,‬
M
‭etc. have replaced the very limited storage of the magnetic strip (the dark strip on‬
‭the back of older cards) with‬‭flash memory‬‭. This is‬‭more‬‭reliable‬‭and has a much‬
‭larger storage capacity‬‭.‬
‭Cards with flash memory are called‬‭smart cards‬‭.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭156‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

(‭ d) USB Memory Sticks:‬


‭These‬ ‭are‬ ‭small‬‭drives‬‭that‬‭can‬‭be‬‭plugged‬‭o n‬‭the‬‭Universal‬‭Serial‬‭Bus‬‭(USB)‬‭o f‬‭the‬
‭CPU. Provide direct storage and access to data.‬
‭Memory‬‭sticks‬‭(or‬‭‘thumb-drives’)‬‭have‬‭made‬‭many‬‭o ther‬‭forms‬‭o f‬‭portable‬‭storage‬
‭almost‬ ‭o bsolete‬ ‭(why‬ ‭burn‬ ‭a‬ ‭CD‬ ‭o r‬ ‭DVD‬‭when‬‭you‬‭can‬‭more‬‭easily‬‭copy‬‭your‬‭files‬
‭o nto‬ ‭a‬ ‭memory‬ ‭stick).‬ ‭Memory‬ ‭sticks‬ ‭are‬ ‭non-volatile‬‭,‬ ‭random-access‬ ‭storage‬
‭devices.‬

‭ ach‬ ‭o f‬ ‭these‬ ‭small‬ ‭devices‬‭has‬‭some‬‭flash‬‭memory‬‭connected‬‭to‬‭a‬‭USB‬‭interface‬‭.‬


E
‭Plug‬ ‭it‬ ‭into‬ ‭your‬ ‭computer‬ ‭and‬ ‭it‬ ‭appears‬ ‭as‬ ‭a‬ ‭drive.‬ ‭You‬ ‭can‬ ‭then‬ ‭add‬‭files,‬‭erase‬
‭files, etc. You can use it to‬‭move any type of file‬‭between computers.‬

S‭ torage‬‭capacity‬‭ranges‬‭from‬‭1‬‭GB,‬‭2‬‭GB,‬‭4‬‭GB,‬
‭8 GB and 32 GB.‬
‭Advantages of Memory Sticks:‬
‭●‬ ‭have a long life span about 3 yrs.‬
‭●‬ ‭Have‬ ‭large‬ ‭storage‬ ‭capacity‬ ‭about‬ ‭32‬
‭GB or more.‬
‭●‬ ‭Provide direct access to data.‬
‭●‬ ‭Very cheap to buy.‬
‭●‬ ‭Portable since they can fit in a pocket.‬
‭Disadvantages of Flash Drives:‬
‭Memory stick‬ ‭●‬ ‭Older‬‭machines‬‭have‬‭no‬‭sockets‬‭to‬‭plug‬
‭in memory sticks.‬
‭●‬ ‭They‬ ‭need‬ ‭software/drivers‬ ‭installed‬
‭for them to work.‬
‭●‬ ‭They‬ ‭can‬ ‭get‬ ‭lost‬ ‭easily.‬ ‭Virus‬ ‭spread‬
‭quickly through them.‬

‭ .‬ ‭Bus:‬ ‭A‬ ‭communication‬ ‭line‬ ‭used‬ ‭for‬ ‭data‬ ‭transfer‬ ‭among‬ ‭the‬ ‭components‬ ‭o f‬ ‭a‬
1
‭computer system‬
‭2.‬ ‭USB:‬ ‭-‬ ‭An‬ ‭external‬ ‭bus‬ ‭that‬ ‭supports‬ ‭Plug‬ ‭and‬ ‭Play‬‭installation‬‭o f‬‭devices.‬‭Using‬
‭USB,‬ ‭you‬ ‭can‬ ‭connect‬ ‭and‬ ‭disconnect‬ ‭devices‬ ‭without‬ ‭shutting‬ ‭down‬ ‭o r‬ ‭restarting‬
‭your‬ ‭computer.‬ ‭You‬ ‭can‬ ‭use‬ ‭a‬ ‭single‬ ‭USB‬ ‭port‬ ‭to‬ ‭connect‬ ‭up‬ ‭to‬ ‭127‬ ‭peripheral‬
‭devices,‬ ‭including‬ ‭speakers,‬ ‭telephones,‬ ‭CD-ROM‬ ‭drives,‬ ‭joysticks,‬ ‭tape‬ ‭drives,‬
‭keyboards,‬‭scanners,‬‭and‬‭cameras.‬‭A‬‭USB‬‭port‬‭is‬‭usually‬‭located‬‭o n‬‭the‬‭back‬‭o f‬‭your‬
‭computer near the serial port or parallel port.‬
‭3.‬ ‭USB‬ ‭port‬‭:‬ ‭An‬ ‭interface‬ ‭o n‬ ‭the‬ ‭computer‬‭that‬‭enables‬‭you‬‭to‬‭connect‬‭a‬‭Universal‬
‭Serial‬ ‭Bus‬ ‭(USB)‬ ‭device.‬ ‭USB‬ ‭is‬ ‭an‬‭external‬‭bus‬‭standard‬‭that‬‭enables‬‭data‬‭transfer‬
‭rates of 12 Mbps (12 million bits per second).‬

‭Optical Storage Media:‬


‭ efers‬ ‭to‬ ‭devices‬ ‭that‬ ‭use‬ ‭light‬ ‭to‬ ‭store‬ ‭data‬ ‭o n‬ ‭them‬ ‭and‬ ‭these‬ ‭include‬ ‭Compact‬
R
‭Disks, Digital Versatile Disks, Video Compact Disks, etc‬
‭1.‬ ‭CD‬ ‭(Compact‬ ‭Disk):‬ ‭It‬ ‭is‬ ‭spherical‬ ‭disc‬‭that‬‭uses‬‭laser‬‭beam‬‭technology‬‭to‬‭read‬
‭and‬‭write‬‭data.‬‭It‬‭stores‬‭data‬‭o n‬‭tracks‬‭in‬‭a‬‭random‬‭way.‬‭Data‬‭retrieval‬‭is‬‭in‬‭random‬
‭o rder.‬ ‭Storage‬ ‭capacity‬ ‭is‬ ‭750‬ ‭MB.‬‭Writing‬‭o f‬‭data‬‭o n‬‭CD‬‭is‬‭done‬‭by‬‭a‬‭device‬‭called‬
‭CD writer/burner.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭157‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Uses of compact disks:‬
‭●‬ ‭Transferring data from one computer to another.‬
‭●‬ ‭Creating backup storage for programs and data.‬
‭●‬ ‭Booting‬ ‭the‬ ‭computer‬ ‭when‬ ‭loading‬ ‭the‬
‭o perating‬ ‭system‬ ‭o r‬ ‭restoring‬ ‭damaged‬ ‭system‬
‭files (system repair).‬
‭Advantages of CDs:‬
‭●‬ ‭Provide fast and direct access to data.‬
‭●‬ ‭Has large storage capacity of about 750 MB.‬
‭Compact disc‬ ‭●‬ ‭Produces high quality sound and pictures.‬
‭●‬ ‭It is a multi-media device.‬
‭Disadvantages‬ ‭of‬ ‭CDs:‬ ‭Can‬ ‭be‬ ‭affected‬ ‭by‬ ‭direct‬
‭sunlight.‬‭Less‬‭durable.‬‭They‬‭can‬‭easily‬‭get‬‭scratched.‬‭Not‬
‭so easy nor fast to save data on them‬

‭Types of CDs‬
‭1.‬ ‭CD-ROM‬ ‭(Compact‬ ‭Disk‬ ‭Read‬ ‭Only‬ ‭Memory)‬ ‭a‬ ‭common‬ ‭form‬ ‭o f‬ ‭o ptical‬
‭Disks on which data, once it has been recorded, cannot be modified.‬
‭2.‬ ‭CD-W‬‭(CD-Writeable)‬‭an‬‭o ptical‬‭disk‬‭that‬‭can‬‭be‬‭written‬‭upon,‬‭but‬‭o nly‬‭o nce.‬
‭Often called WORM (Write Once Read Many) disks.‬
‭3.‬ ‭CD-RW‬ ‭(CD-Rewriteable)‬ ‭o n‬ ‭o ptical‬ ‭disk‬ ‭that‬ ‭allows‬ ‭personal‬ ‭computer‬
‭users‬ ‭to‬ ‭replace‬ ‭their‬ ‭diskettes‬ ‭with‬ ‭high-capacity‬ ‭CDs‬ ‭that‬ ‭can‬ ‭be‬ ‭written‬
‭upon and edited over.‬

‭ dvantages‬ ‭to‬ ‭schools‬ ‭of‬ ‭storing‬ ‭learning‬ ‭materials‬ ‭on‬ ‭a‬ ‭CD-ROM‬ ‭other‬ ‭than‬
A
‭using the Internet‬
‭●‬ ‭No danger of accessing doubtful websites.‬
‭●‬ ‭Does not take as long to find required information.‬
‭●‬ ‭Do not have to have a modem.‬
‭●‬ ‭Do not need for a telephone line.‬
‭●‬ ‭Once CD ROM is bought there is no additional expenditure.‬
‭●‬ ‭Do not have to remember user id/password.‬
‭●‬ ‭Usually quicker to load material.‬
‭●‬ ‭Information on CD is more reliable‬
‭Disadvantages‬‭to‬‭schools‬‭of‬‭storing‬‭learning‬‭materials‬‭on‬‭a‬‭CD-ROM‬‭other‬‭than‬
‭using the Internet‬
‭●‬ ‭CD ROM can be lost easily.‬
‭●‬ ‭CD‬ ‭ROM‬ ‭can‬ ‭be‬ ‭damaged‬‭easily.‬‭Internet‬‭is‬‭up‬‭to‬‭date‬‭while‬‭CD‬‭ROM‬‭is‬‭soon‬
‭o ut of date.‬
‭●‬ ‭CD ROMs are expensive to replace and to update.‬
‭●‬ ‭Less information can be stored on the CD-ROM as compared to the internet.‬

‭ .‬ ‭DVD‬ ‭(Digital‬ ‭Versatile‬ ‭Disc):‬ ‭Are‬ ‭spherical‬ ‭in‬ ‭shape‬ ‭that‬ ‭can‬ ‭store‬ ‭data‬ ‭o n‬ ‭2‬
2
‭sides.‬ ‭Stores‬ ‭data‬ ‭o n‬ ‭tracks‬ ‭in‬ ‭a‬ ‭random‬ ‭way.‬ ‭Data‬ ‭retrieval‬ ‭is‬ ‭in‬ ‭random‬ ‭o rder.‬
‭Storage‬ ‭capacity‬ ‭is‬ ‭about‬ ‭4‬ ‭GB.‬ ‭Writing‬ ‭o f‬ ‭data‬ ‭o n‬ ‭DVD‬ ‭is‬ ‭done‬ ‭by‬ ‭a‬ ‭device‬ ‭called‬
‭DVD writer/burner. There are several formats on the market, such as:‬
‭DVD-ROMs‬ ‭- read only, the data is written to them‬‭before they are sold.‬
‭DVD-R‬ ‭-‬‭meaning‬‭DVD-Recordable,‬‭the‬‭user‬‭can‬‭write‬‭data‬‭to‬‭the‬‭DVD‬‭o nce‬‭o r‬
‭fill it over time using multi-session.‬
‭DVD-RW‬ ‭-‬ ‭meaning‬ ‭DVD-ReWritable,‬ ‭the‬‭DVD‬‭can‬‭be‬‭written‬‭and‬‭re-written‬‭to.‬
‭Unlike multi-session discs, existing data can be overwritten.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭158‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭Uses of DVDs:‬
‭●‬ ‭Transferring larges volumes of data from one computer to another.‬
‭●‬ ‭Creating backup storage for programs and data.‬
‭●‬ ‭Booting‬ ‭the‬ ‭computer‬ ‭when‬ ‭loading‬ ‭the‬ ‭o perating‬ ‭system‬ ‭o r‬ ‭restoring‬
‭damaged system files (system repair)‬
‭Advantages of DVDs:‬
‭●‬ ‭Provide fast and direct access to data.‬
‭●‬ ‭Has large storage capacity of about 4 GB.‬
‭●‬ ‭Produces high quality sound and pictures.‬
‭●‬ ‭It is a multi-media device.‬
‭Disadvantages of DVDs:‬
‭●‬ ‭Can be affected by direct sunlight.‬
‭●‬ ‭Less durable.‬
‭●‬ ‭They can easily get scratched.‬
‭Caring for DVDs, VCDs and CDs:‬
‭●‬ ‭Do not expose them to direct sunlight.‬
‭●‬ ‭Do not touch the recording surface.‬
‭●‬ ‭Use soft marker for labelling and not ball point.‬
‭●‬ ‭Keep the free form dust conditions.‬

*‭ NB:‬ ‭-‬ ‭Virtual‬ ‭Memory‬ ‭–‬ ‭Refers‬ ‭to‬ ‭temporary‬ ‭storage‬ ‭(on‬ ‭hard‬ ‭disk)‬ ‭used‬ ‭by‬ ‭the‬
‭computer‬ ‭to‬ ‭run‬ ‭programs‬ ‭that‬ ‭need‬ ‭more‬ ‭memory‬‭(RAM)‬‭than‬‭the‬‭computer‬‭has.‬
‭For‬ ‭example,‬ ‭programs‬ ‭could‬ ‭have‬ ‭access‬ ‭to‬ ‭4‬ ‭gigabytes‬ ‭o f‬ ‭virtual‬ ‭memory‬ ‭o n‬ ‭a‬
‭computer's hard drive, even if the computer has only 32 megabytes of RAM.‬

‭COMPUTER APPLICATION IN EDUCATION‬


‭i. The use Internet allows unlimited access of information on all subjects‬

i‭i.‬ ‭Distance‬ ‭learning‬ ‭made‬ ‭easier‬ ‭through‬ ‭chartrooms,‬ ‭digital‬ ‭interactive‬ ‭television,‬
‭CD-ROM‬‭(storage‬‭o f‬‭encyclopaedia,‬‭learning‬‭materials‬‭(content)).‬‭Learning‬‭materials‬
‭like‬ ‭the‬ ‭encyclopaedia‬ ‭can‬ ‭be‬ ‭stored‬ ‭o n‬ ‭the‬ ‭CD‬ ‭ROM‬ ‭as‬ ‭it‬ ‭will‬ ‭have‬ ‭the‬ ‭following‬
‭advantages‬‭as compared to a printed (manual) encyclopaedia:‬
‭●‬ ‭Cannot write to it so cannot be changed.‬
‭●‬ ‭Can use sound, text as well as video for students to understand better.‬
‭●‬ ‭Search of data is quicker.‬
‭●‬ ‭Can printout data conveniently.‬
‭●‬ ‭It takes up less space.‬
‭●‬ ‭Is more portable.‬

‭ owever,‬‭the‬‭electronic‬‭encyclopaedia‬‭has‬‭the‬‭following‬‭disadvantages‬‭as‬‭compared‬
H
‭to a manual one:‬
‭●‬ ‭Users need a suitable multimedia computer for them to use it.‬
‭●‬ ‭The computer could crash and access to data will not be possible.‬
‭●‬ ‭Can lead to electricity expenses.‬
‭●‬ ‭Cannot be read in awkward locations.‬
‭●‬ ‭Takes time to start up the computer.‬
‭●‬ ‭The disk can be stolen easily.‬
‭●‬ ‭You can’t add notes to a Recordable Compact Disk‬

i‭ii.‬ ‭People‬‭with‬‭communication‬‭difficulties‬‭like‬‭the‬‭blind‬‭and‬‭deaf‬‭are‬‭assisted,‬‭e.g.‬‭in‬
‭voice recognition systems.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭159‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬

i‭v.‬‭Computers‬‭can‬‭be‬‭used‬‭to‬‭organise‬‭events‬‭in‬‭schools,‬‭for‬‭example,‬‭parents’‬‭visits,‬
‭timetable, etc.‬
‭v. Used to store students data, exams, teachers records, etc.‬
‭vi. Used as teaching aids in all subjects. Enables interactive teaching‬
‭vii. For marking multiple choice examinations on scanner sheets‬
‭viii. For storage of student data pertaining to subjects, teachers and subjects taken.‬
‭ix.‬ ‭Used‬ ‭as‬ ‭a‬ ‭subject‬ ‭for‬ ‭student‬ ‭to‬ ‭learn,‬ ‭e.g.‬ ‭Computer‬ ‭Science,‬ ‭Information‬
‭Technology, etc.‬
‭x.‬ ‭Used‬ ‭for‬ ‭carrying‬ ‭o ut‬ ‭researches‬ ‭and‬ ‭experiments‬ ‭which‬ ‭may‬ ‭be‬ ‭dangerous‬ ‭for‬
‭human beings to do.‬
‭xi.‬ ‭Computers‬ ‭can‬ ‭also‬ ‭be‬ ‭used‬ ‭in‬ ‭Computer‬ ‭Aided‬ ‭Learning‬ ‭(CAL)‬ ‭and‬ ‭Computer‬
‭Aided Instruction (CAI).‬
‭CAI‬‭:‬ ‭a‬ ‭teaching‬ ‭system‬ ‭that‬ ‭o perates‬ ‭o n‬ ‭drill‬ ‭and‬‭practice‬‭principle,‬‭for‬‭instance,‬‭in‬
‭teaching‬‭computers,‬‭a‬‭student‬‭is‬‭presented‬‭with‬‭a‬‭word‬‭and‬‭its‬‭meaning.‬‭The‬‭student‬
‭studies it and will be asked its meaning at a later stage.‬
‭CAL‬‭:‬‭This‬‭whereby‬‭a‬‭lesson‬‭is‬‭rehearsed‬‭before‬‭the‬‭computer‬‭and‬‭then‬‭played‬‭back‬
‭to‬‭the‬‭class‬‭when‬‭the‬‭teacher‬‭is‬‭not‬‭physically‬‭present.‬‭The‬‭computer‬‭is‬‭thereby‬‭used‬
‭to‬‭teach‬‭the‬‭pupil.‬‭For‬‭example,‬‭the‬‭computer‬‭present‬‭a‬‭topic‬‭just‬‭like‬‭a‬‭teacher‬‭does‬
‭in‬‭a‬‭lesson.‬‭Pupils‬‭are‬‭asked‬‭questions.‬‭If‬‭they‬‭fail,‬‭the‬‭lesson‬‭is‬‭repeated;‬‭o therwise‬‭a‬
‭new topic will be presented. CAL has the following‬‭advantages‬‭:‬
‭●‬ ‭This‬ ‭system‬ ‭allows‬ ‭pupils‬‭to‬‭study‬‭at‬‭their‬‭own‬‭pace,‬‭repeating‬‭sections‬‭they‬
‭do not understand.‬
‭●‬ ‭Material is presented in a consistent way making learning easier.‬
‭●‬ ‭Few teachers are required.‬
‭●‬ ‭Computers‬ ‭are‬ ‭endlessly‬ ‭patient‬ ‭and‬ ‭can‬ ‭repeat‬ ‭sections‬ ‭that‬ ‭pupils‬‭did‬‭not‬
‭understand without hesitation.‬

x‭ ii. Used for typing and printing examination papers and keeping of student results.‬
‭Some‬‭schools‬‭have‬‭pupils‬‭who‬‭are‬‭either‬‭blind‬‭o r‬‭partially‬‭sighted.‬‭Computers‬‭could‬
‭be used to help these pupils to learn in the following ways:‬
‭●‬ ‭Use of sound (voice) output and speech synthesiser.‬
‭●‬ ‭Use of speech (voice) input, recognition or microphones.‬
‭●‬ ‭Type using large characters (large font size) on the screen.‬
‭●‬ ‭Use of Braille keyboards, touch screens, touch pads.‬
‭●‬ ‭Use of bright colours to improve visibility.‬
‭●‬ ‭Use of scanners to input information and output speech.‬
‭●‬ ‭Use of printers which give output in Braille‬
‭Xiii: Electronic Registration (e-registration) of students‬
‭xiv. E-marking of student examinations‬

‭COMPUTER APPLICATION IN BANKS‬


‭Uses of computers in banks:‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭160‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
i‭ .‬ ‭Used‬ ‭for‬ ‭storage‬ ‭o f‬ ‭client‬ ‭account‬ ‭details‬ ‭like,‬ ‭account‬ ‭name,‬ ‭account‬ ‭number,‬
‭address,‬ ‭sex,‬ ‭date‬ ‭o f‬ ‭birth,‬ ‭national‬ ‭identification‬ ‭number,‬ ‭balance,‬ ‭withdrawal,‬
‭deposit, overdraft, interest, etc.‬

i‭ i‬‭.‬‭Used‬‭for‬‭c ash‬‭disbursement‬‭at‬‭the‬‭Automated‬‭Teller‬‭Machine‬‭(ATM).‬‭An‬‭ATM‬‭is‬
‭a‬ ‭computerised,‬ ‭special‬ ‭purpose‬ ‭cash‬ ‭disbursement‬ ‭machine‬ ‭o utside‬ ‭banking‬ ‭halls‬
‭used even when banks are closed. Services offered at the ATM include:‬
‭●‬ ‭Balance enquiry,‬
‭●‬ ‭mini-bank statement,‬
‭●‬ ‭facility to change PIN code,‬
‭●‬ ‭cash withdrawal, etc‬
‭PIN‬ ‭(Personal‬ ‭Identification‬ ‭Number)‬ ‭-‬ ‭a‬ ‭secret‬ ‭number‬ ‭used‬ ‭by‬ ‭individual‬
‭account‬ ‭holders‬ ‭to‬ ‭access‬ ‭bank‬ ‭account‬ ‭and‬ ‭get‬ ‭service‬ ‭at‬ ‭the‬ ‭ATM.‬ ‭The‬ ‭account‬
‭holder needs a debit card for him/her to access bank services at the ATM.‬
‭The‬ ‭Account‬ ‭holder‬ ‭inserts‬ ‭the‬ ‭debit‬ ‭card‬ ‭into‬ ‭the‬ ‭hole‬ ‭o n‬ ‭the‬ ‭ATM,‬ ‭which‬‭in‬‭turn‬
‭request‬ ‭the‬ ‭user’s‬ ‭PIN.‬ ‭The‬ ‭user‬ ‭enters‬ ‭the‬ ‭PIN‬ ‭and‬ ‭then‬ ‭presses‬ ‭enter.‬ ‭The‬ ‭ATM‬
‭validates‬ ‭the‬‭PIN,‬‭and‬‭if‬‭it‬‭is‬‭correct,‬‭allows‬‭the‬‭user‬‭to‬‭select‬‭service‬‭required‬‭from‬
‭the‬ ‭list‬ ‭o f‬ ‭o ptions‬ ‭available.‬ ‭If‬ ‭the‬ ‭user‬ ‭enters‬ ‭the‬ ‭wrong‬‭PIN‬‭for‬‭three‬‭consecutive‬
‭attempts,‬ ‭the‬ ‭ATM‬ ‭would‬ ‭not‬ ‭eject‬ ‭the‬ ‭debit‬ ‭card,‬ ‭assuming‬ ‭that‬ ‭you‬ ‭are‬ ‭not‬ ‭the‬
‭owner of the card and no service shall be given.‬

i‭ ii.‬ ‭Clearance‬ ‭of‬ ‭c heques‬‭:‬ ‭The‬ ‭main‬‭branch‬‭receives‬‭cheques‬‭from‬‭o ther‬‭branches‬


‭and‬ ‭processes‬ ‭them‬ ‭using‬ ‭the‬ ‭batch‬ ‭processing‬ ‭method.‬ ‭MICR‬‭is‬‭used‬‭to‬‭read‬‭data‬
‭from the cheques into the computer.‬

i‭ v.‬ ‭Electronic‬ ‭Funds‬ ‭Transfer‬ ‭at‬ ‭Point‬ ‭o f‬ ‭Sale‬ ‭(EFTPOS):‬ ‭This‬ ‭is‬ ‭a‬ ‭method‬ ‭o f‬
‭transferring‬ ‭money‬ ‭from‬ ‭o ne‬ ‭account‬ ‭to‬ ‭another‬‭electronically‬‭without‬‭handling‬‭o f‬
‭cash‬‭at‬‭the‬‭Point‬‭o f‬‭Sale‬‭terminal‬‭in‬‭shops.‬‭The‬‭Point‬‭o f‬‭Sale‬‭terminals‬‭will‬‭be‬‭o nline‬
‭the‬ ‭bank’s‬ ‭database,‬ ‭enabling‬‭the‬‭shop‬‭to‬‭deduct‬‭cash‬‭from‬‭the‬‭customer’s‬‭account‬
‭and‬ ‭transfer‬ ‭it‬ ‭to‬‭the‬‭shop’s‬‭account.‬‭For‬‭this‬‭to‬‭o ccur‬‭the‬‭customer‬‭is‬‭supposed‬‭to‬
‭produce‬‭the‬‭debit‬‭card,‬‭which‬‭is‬‭wiped‬‭o n‬‭the‬‭card‬‭reader‬‭which‬‭in‬‭turn‬‭requests‬‭the‬
‭client to enter the PIN. Some cash back is available at the POS.‬

‭ lectronic‬ ‭banking‬ ‭(e-banking):‬ ‭the‬ ‭process‬ ‭o f‬ ‭carrying‬‭o ut‬‭all‬‭bank‬‭transactions‬


E
‭electronically‬ ‭o n‬ ‭the‬ ‭internet‬ ‭(internet‬ ‭banking)‬ ‭and‬ ‭by‬ ‭use‬ ‭o f‬ ‭cell‬ ‭phones.‬ ‭This‬ ‭is‬
‭almost similar to tele-banking.‬
‭For‬‭Internet‬‭banking‬‭,‬‭credit‬‭cards‬‭are‬‭required‬‭for‬‭clients‬‭to‬‭get‬‭access‬‭to‬‭the‬‭bank‬
‭accounts.‬ ‭Data‬ ‭about‬ ‭credit‬ ‭cards‬ ‭is‬ ‭stored‬ ‭o n‬ ‭the‬ ‭magnet‬ ‭strip‬ ‭and‬ ‭this‬ ‭includes:‬
‭Date‬ ‭o f‬ ‭issue,‬ ‭Bank‬ ‭code,‬ ‭Branch‬ ‭code,‬ ‭Account‬ ‭number,‬ ‭Card‬ ‭number‬ ‭and‬ ‭Expiry‬
‭date.‬‭Information‬‭entered‬‭by‬‭a‬‭client‬‭to‬‭access‬‭banking‬‭services‬‭from‬‭home‬‭includes:‬
‭Account Number, Account name and password.‬
‭In‬‭home‬‭banking‬‭,‬‭users‬‭can‬‭stop‬‭a‬‭cheque,‬ ‭enquire‬‭their‬‭account‬‭balances,‬‭transfer‬
‭money‬ ‭between‬ ‭accounts,‬ ‭pay‬ ‭bills,‬ ‭o rder‬ ‭a‬ ‭cheque‬ ‭book,‬ ‭look‬ ‭at‬ ‭account‬
‭transactions‬ ‭for‬ ‭a‬ ‭given‬ ‭period,‬ ‭request‬ ‭a‬ ‭change‬ ‭o f‬ ‭pin‬ ‭o r‬ ‭password,‬ ‭amend‬ ‭o r‬
‭create‬‭standing‬‭o rders/direct‬‭debits,‬‭print‬‭statements‬‭and‬‭change‬‭personal‬‭details.‬‭It‬
‭is impossible to withdraw cash or pay in cash.‬

‭In home banking, the following advantages are realised by customers:‬


‭●‬ ‭Do not have to waste time travelling long distances to banks.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭161‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭●‬ D ‭ o‬ ‭not‬ ‭have‬‭to‬‭spend‬‭money‬‭o n‬‭travelling‬‭expenses‬‭travelling‬‭long‬‭distances‬
‭to banks.‬
‭●‬ ‭No embarrassment of having to ask for loans face to face.‬
‭●‬ ‭Can do bank transactions even when banks are closed.‬
‭●‬ ‭Do not have to waste time waiting for a response to telephone banking.‬

‭However, home banking has the following disadvantages:‬


‭●‬ ‭Less‬ ‭personal‬ ‭touch‬ ‭is‬ ‭involved‬ ‭hence‬ ‭no‬ ‭socialisation‬ ‭with‬ ‭friends‬ ‭and‬
‭neighbours.‬
‭●‬ ‭More expensive phone bills are to be paid.‬
‭●‬ ‭Lack of exercises as user just sits on the computer.‬
‭●‬ ‭Hackers can access personal details and transfer money to their accounts.‬
‭●‬ ‭You‬‭have‬‭to‬‭have‬‭a‬‭computer‬‭and‬‭an‬‭Internet‬‭access‬‭o f‬‭which‬‭less‬‭people‬‭can‬
‭afford.‬
‭●‬ ‭Users are unable to withdraw cash‬

‭ hen‬ ‭purchasing‬ ‭the‬ ‭goods,‬ ‭the‬ ‭supermarkets‬ ‭and‬ ‭any‬ ‭o ther‬ ‭shops‬ ‭check‬ ‭the‬
W
‭following on the credit card:‬
‭●‬ ‭Check if the card is valid.‬
‭●‬ ‭Check if credit limit is not exceeded.‬
‭●‬ ‭Check if credit card is not reported as stolen.‬
‭●‬ ‭Check if expiry date has not been exceeded.‬

‭ he‬‭introduction‬‭o f‬‭ATMs,‬‭EFT‬‭and‬‭electronic‬‭banking,‬‭including‬‭internet‬‭banking‬‭has‬
T
‭the following advantages and disadvantages.‬
‭Advantages to Bank workers‬
‭●‬ ‭Their‬ ‭workload‬ ‭is‬ ‭reduced,‬ ‭for‬ ‭instance‬ ‭the‬ ‭burden‬ ‭o f‬ ‭counting‬ ‭cash‬ ‭and‬
‭service many clients can be done the ATM.‬
‭●‬ ‭Reduction‬ ‭in‬ ‭mistakes,‬ ‭for‬ ‭instance‬ ‭counting‬ ‭cash‬ ‭and‬ ‭updating‬ ‭wrong‬
‭accounts as the computers validate details during entry.‬
‭●‬ ‭Reduction in working hours.‬
‭●‬ ‭Increased salaries.‬
‭●‬ ‭Better working conditions‬

‭Disadvantages to Bank Workers‬


‭●‬ ‭Some lose their jobs due to computerisation.‬
‭●‬ ‭Leads‬ ‭to‬ ‭de-skilling‬ ‭where‬ ‭some‬ ‭jobs‬ ‭are‬ ‭taken‬ ‭as‬ ‭redundant,‬ ‭for‬ ‭example‬
‭clerical jobs.‬
‭●‬ ‭Some workers will be transferred‬

‭Advantages to Bank clients‬


‭●‬ ‭Customers get faster service as they are served quickly.‬
‭●‬ ‭Customers‬‭save‬‭time‬‭spend‬‭in‬‭travelling‬‭to‬‭banking‬‭halls‬‭by‬‭use‬‭o f‬‭cell‬‭phones‬
‭and internet bank.‬
‭●‬ ‭Customers‬‭no‬‭longer‬‭carry‬‭around‬‭large‬‭amounts‬‭o f‬‭cash‬‭as‬‭all‬‭payments‬‭are‬
‭done electronically and this reduces robbery cases.‬
‭●‬ ‭Clients‬ ‭get‬‭bank‬‭services‬‭at‬‭ATMs‬‭even‬‭during‬‭public‬‭holidays,‬‭weekends‬‭and‬
‭after hours.‬
‭●‬ ‭Customers are provided with 24 hour services.‬
‭●‬ ‭Customers save money used to pay travelling expenses to banks.‬

‭Disadvantages to Bank clients‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭162‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬
‭‘O’ Level Computer Studies Notes-ZIMSEC Syllabus‬
‭‬ C
● ‭ ustomers can lose money through credit card fraud.‬
‭●‬ ‭Customers may forget their PIN and fail to get service at ATM.‬
‭●‬ ‭Debit‬ ‭cards‬ ‭and‬ ‭credit‬ ‭cards‬ ‭can‬ ‭be‬ ‭stolen‬ ‭and‬ ‭used‬ ‭illegally‬ ‭thereby‬
‭customers will lose their money.‬
‭●‬ ‭There‬‭are‬‭cases‬‭o f‬‭phantom‬‭withdrawals:‬‭unexplained‬‭cash‬‭withdrawals‬‭from‬
‭bank accounts.‬

J‭ OBS IN THE COMPUTER INDUSTRY‬


‭IT personnel‬
‭The personnel/ jobs found in the computer industry includes the following:‬
‭-‬ ‭Data‬ ‭c apture‬ ‭c lerk‬‭:‬ ‭entering‬ ‭data‬ ‭into‬ ‭the‬ ‭computer‬‭system.‬‭A‬‭lot‬‭o f‬‭typing‬
‭skills is required.‬
‭-‬ ‭Database‬‭Administrator‬‭:‬‭Manages‬‭the‬‭database‬‭o f‬‭an‬‭o rganisation,‬‭allowing‬
‭o r controlling access, updating and use of the database among users‬
‭-‬ ‭Hardware‬ ‭Technician‬‭:‬ ‭for‬ ‭troubleshooting‬ ‭and‬ ‭repairing‬ ‭o f‬ ‭computer‬
‭hardware like printers, replacing parts, etc.‬
‭-‬ ‭Network‬ ‭Technician‬‭:‬ ‭for‬ ‭troubleshooting‬ ‭the‬ ‭network‬ ‭and‬ ‭for‬ ‭network‬
‭maintenance‬
‭-‬ ‭Network Administrator‬‭: giving access rights to the‬‭network‬
‭-‬ ‭Systems‬ ‭Analyst‬‭:‬ ‭investigating‬ ‭system‬ ‭and‬ ‭recommends‬ ‭the‬ ‭best‬ ‭solution‬‭to‬
‭computer systems.‬
‭-‬ ‭Programmer‬‭: designs, codes and test computer programs‬
‭-‬ ‭IT Manager‬‭: Manager information systems within an‬‭o rganisation‬
‭-‬ ‭Computer‬ ‭Teacher/Lecturer‬‭:‬ ‭teaches‬ ‭computer‬ ‭studies‬ ‭and‬ ‭computer‬
‭sciences in schools, colleges and universities.‬

‭Compiled by:‬ ‭Kapondeni T.‬ ‭Cell:‬‭0772 245 866‬ ‭Page‬‭163‬‭of‬‭163‬ ‭Date:‬ ‭21-Oct-2020‬

You might also like